text
stringlengths 8
5.77M
|
---|
Electrophysiological studies on the effects of opiates on dorsal horn nociceptive neurones at 51 atmospheres absolute.
The purpose of this study was to investigate the effects, if any, of high pressure on opiate analgesia. The interaction of high pressure with intrathecal morphine (2.5-15 micrograms) and pethidine (10-145 micrograms) was studied on the responses of 51 dorsal horn neurones in the intact rat under urethane anaesthesia to electrical stimulation applied to their receptive fields. Two types of response to the addition of the opiates were found. Cells were either rapidly and maximally inhibited by the lowest dose of morphine (2.5 micrograms) or pethidine (10 micrograms) or slowly inhibited in a dose-dependent manner with an ED50 of 13.6 nmol for morphine and 401 nmol for pethidine. Pressure did not significantly affect the time-response curves for these two types of response but did change the relative numbers of each type recorded. The number of cells totally inhibited by the lowest of drug concentrations was increased for morphine at pressure but decreased for pethidine. |
Many services offered to users via the Internet, such as email services, provide a web interface (“webclient”) that allows users to interact with a server using a web browser. User connectivity to such servers is facilitated by one or more web servers (typically Hypertext Transfer Protocol (HTTP) servers) that retrieve data in response to user web page requests and host web applications. Mail servers and web servers are typically located in a data center or some other facility remote from the user. Redundancy is usually built into such systems, with redundant servers providing service in the event of a failure of a primary server and redundant communications links connected to the Internet to provide service in the event of a failure of one or more communications links.
When a user attempts to access an email system using a webclient, the webclient connects to a web email application hosted by an HTTP server and sets up a communications session with the HTTP server. Upon initiating such a session, some form of authentication is normally required by the HTTP server. This may take the form of a username and password combination, access key, token, or some other form of user identity verification. Upon authenticating the user, the HTTP server may provide access to the user's email account and information on the mail server via the web email application hosted by the HTTP server. If there is a failure of the HTTP server hosting the web email application being used by the webclient, or if the connection between the HTTP server and the webclient fails, the webclient is likely to be directed to a backup HTTP server hosting another web email application. When this happens, the user may have to provide authentication information again because the user's authentication information has not been received by, or stored at, the backup HTTP server. |
Q:
How to test for differences with multiple observations per subject under the same (level-2) condition?
I'm trying test for the difference in a numeric outcome (WearTime) that was measured 7 times (7 consecutive days) for each subject under the same condition (Season) that was measured at the participant level. The question I want to test is: "Does Season affect daily WearTime?" This is not a primary outcome, but more of a check for going forward to determine if Seasonality needs to be accounted for in future analyses.
Data structure: 700obs, 5 variables
SubjectID: 100 individuals
ObservationDay: 1 to 7; Day 1 refers to
1st dat etc. Every subject has 7 days with values
Date: Date of ObservationDay; 7 days in sequence spread throughout a
year
Season: Fall/Winter/Spring/Summer; Season when observation period
began based on Date from ObservationDay 1 for that subject
WearTime: 0-1440 minutes; How long an electronic device was worn by a
participants on each ObservationDay
My instinct for testing this is a mixed model ANOVA approach with Season as an independent fixed-effects factor, and subject ID as a random effects factor.
e.g. code from R (as this is the notation I am familiar with)
library(lme4)
library(car)
Anova(lmer(formula = WearTime ~ Season + (1 | Subject), data = df)
But if WearTime is measured at level-1 (per day, per subject), should Season be classified as a level-2 (per subject) variable?
Something more along the lines of:
WearTime ~ (1 | Season)
So my questions to you is which interpretation of the Season variable is correct? As a level-1 or 2 variable? And if the latter how would I go about testing for a difference by Season (as when I try to apply car::Anova to the above model I get an error, so I assume this is not a valid approach)? Just want to make sure I'm using the appropriate statistical approach before wrestling with code.
Thanks in advance!
A:
It does not matter what level a variable belongs to. The software doesn't care. At least, all the mixed effects software that I am aware of does not care, and you are using equation formats commonly used in mixed effects software.
So, the heart of your question seems to be how to specify the random effects. You have repeated measures within subjects, so ... + (1 | Subject) is appropriate. If you don't specify random intercepts for subjects then you won't be controlling for the non-independence of observations within each subject.
So, the question is between:
WearTime ~ Season + (1 | Subject)
or
WearTime ~ 1 + (1 | Season) + (1 | Subject)
Since your research question is specifically about the "affect" of Season, and since you can't really consider the sample of seasons in your dataset as being taken from a larger population of seasons, I would favour the first case where you treat Season as a fixed effect and your interest centres on the estimated regression coefficients for it.
In the second case you treat season as random (crossed random effects) and your interest centres on the estimated variance for it - but that makes much less sense to me.
You may also also want to include the date of each observation, perhaps as the number of days from baseline and see if it interacts with season. So you could have:
WearTime ~ Season * Days + (1 | Subject)
or even
WearTime ~ Season * Days + (Season * Days | Subject)
provided that the data supports such a random structure.
It's also common to consider nonlinearities for time, which you could introduce with higher order terms, or even better, splines.
|
Q:
Most recent distinct record from a joined MySQL table
I have two tables, one of a list of competition results, and one with ELO ratings (based on previous competitions).
Fetching the list of competitors for an arbitrary competition is trivial enough, but I also need to get the most recent rating value for them.
score:
id | eventid | competitorid | position
1 1 1 1
2 1 2 2
3 1 3 3
4 2 2 1
5 2 3 2
6 3 1 1
7 3 3 2
8 3 2 3
rating:
id | competitorid | rating
1 1 1600
2 2 1500
3 3 1500
4 2 1600
5 3 1590
Expected output for a query against score.eventid = 3 would be
id | competitorid | position | rating
6 1 1 1600
7 3 2 1590
8 2 3 1600
At the moment my code looks like:
SELECT score.scoreID, score.competitorID, score.position,
rating.id, rating.rating
FROM score, rating
WHERE score.competitorid = rating.competitorid
AND score.eventid = 3
ORDER BY score.position
which gives an output of
id | competitorid | position | rating.id | rating
6 1 1 1 1600
7 3 2 2 1500
7 3 2 4 1590
8 2 3 3 1500
8 2 3 5 1600
basically it's showing the data from the score table for that correct event, but giving me a row for every rating available against that competitorID unfortunately I have no idea where to build in the DISTINCT statement or how to limit it to the most recent result.
MySQL noob, and managed DISTINCT statements, but not with joins. Unfortunately most previous questions seemed to deal with getting distinct results from a single table, which is not quite what I'm after. Thanks!
A:
One way to get the rating is with a correlated subquery:
SELECT s.scoreID, s.eventID, s.competitorID, s.position,
(select r.rating
from rating r
where s.competitorID = r.competitorID
order by r.id desc
limit 1
) as rating
FROM score s
WHERE s.eventID = 3
ORDER BY s.position;
I'm not sure what ratingprid is, so this only includes the rating.
|
The structure of acnistin B and the immunosuppressive effects of acnistins A, B, and E.
The structure of the new withanolide:acnistin B, isolated from Dunalia solanacea, has been established by NMR experiments and the immunosuppressive effects of acnistins A, B and E on human lymphocytes have been measured. |
Thursday, December 09, 2004
Moles
Trust is a rare commodity in student politics; much more so than politics in general. Because the stakes are so small, the game is so much more vicious.
Every year during O-Week, various political factions pay their members to join other factions, to gain access to their email lists and meetings. Information is one of the currencies of power, and if you learn what the other faction is planning, then you have a significant advantage over them.
This truism is demonstrated in the much-delayed entry by Brent Houghton, former MUSU Housing and Services OB in 2002.
The mole may or may not have had a part to play in the downfall of the Sharp ticket - certainly if there was any one person to blame, it would be me. You see, as with most student representatives, I used my office in preparing for the campaign. (I had first hand experience of this earlier in the year, when the President's office was used to discuss whether Real Students would run in the by-election - when Brad Tutt decided not to contest the Education Officer position, Real Students decided not to run.) But I digress. I certainly didn't use the office resources to print out election material, nor use my Union email address in organising the campaign. However, I don't deny that campaigners were encouraged to come to my office to sign their nomination forms, or that on the fateful evening of Wednesday, 21st August, 2002, Ari, myself and two others used the office computer and the whiteboard to prepare the nomination statements for the ticket. I remember meeting up with Ari and the three others on that evening. From memory, we met at the UBar and decided that if we were going to be productive, then we needed to work on a computer, as the statements were due at noon on Friday. Given that the Union's computing centre was about to close, I stupidly suggested that we use my office.
There seemed to be nobody in the office, so Ari, I and the three others used the computer to flesh out the 100-200 word statements that needed to be completed if we were to look like a competitive ticket. I decided to leave at around 9.30pm, as from memory, I had been at uni since early that morning. I indicated that the others could use my office, but that they should lock the door on the way out.
I should mention that 2002 was a year characterised by suspicion and misinformation. Given the absolute necessity by Student Unity to maintain their control over MUSU, it is hardly surprising that not only did they infiltrate the Sharp-Ticket egroup, but then conspired to have the ticket thrown out.
In retrospect, Brent's decision to use union resources, even rooms, whiteboards and computers, was not a wise one, given that his opposition were both ruthless and in the same office-space. It is also unfair, and forbidding that use by current OBs to use their offices to run campaigns to get relected is ethically suspect, and undemocratic. In the grand scheme of things, given what happened in 2002, 2003 and 2004, Brent's crime was minor and forgivable.
The lesson that Brent and Ari learned, and something for us to all take note of, is to chose your friends and companions carefully. If you have sensitive information, that information should be in as few hands as possible, particularly if your opponents could make use of it for their own political gain. Your access and use of resources is one such example. Which is not to say that information should be hoarded by a select few, but rather that you should ensure that the information is going to people you know and trust. |
Start Date: 12/26/01; HourAhead hour: 2; No ancillary schedules awarded. No variances detected.
LOG MESSAGES:
PARSING FILE -->> O:\Portland\WestDesk\California Scheduling\ISO Final Schedules\2001122602.txt |
#----------------------------------PLEASE NOTE---------------------------------#
#This file is the author's own work and represents their interpretation of the #
#song. You may only use this file for private study, scholarship, or research. #
#------------------------------------------------------------------------------##
From: Lee Eugene T
Subject: CRD: HOLD ON - SARAH MCLACHLAN
Hold On
CAPO 1
G
Hold on
Hold on to yourself
DC
for this is gonna hurt like hell
G
Hold on
Hold on to yourself
DC
you know that only time will tell
AmD
What is it in me that refuses to believe
AmC
this isn't easier than the real thing
(SAME AS ABOVE)
My love
you know that you're my best friend
you know I'd do anything for you
my love
let nothing come between us
my love for you is strong & true
AmDAm I in heaven here or am I...
AmC
at the crossroads I am standing
EmG
So now you're sleeping peaceful
CD
I lie awake & pray
EmG
that you'll be strong tomorrow & we'll
CDAmD
see another day & we will praise it
AmC
& love the light that brings a smile
G
across your face
Oh god if you're out there
won't you hear me
I know that we've never talked before
oh god the man I love is leaving
won't you take him
when he comes to your door
Am I in heaven here or am I in hell
at the crossroads I am standing
So now you're sleeping peaceful
I lie awake & pray
that you'll be strong tomorrow & we'll
see another day & we will praise it
& love the light that brings a smile
across your face...
Hold on
hold on to yourself
for this is gonna hurt like hell
GENE[email protected]
feel free to correct or comment at the address above. |
What is Spirituality?How does it figure in success?
What is Spirituality?
Listen, success arises as much from spiritual abilities as from intellectual means, yet too often we shy away. We think that a spiritual person will go on and on about God, or their religion, or their church. We think that they will repeat the dogma that we were exposed to early in life. Frankly, too many of us have had enough of that already!
So again, What is Spirituality? Why is the issue of spirituality important to success?
If we want to have the benefits of being successful, (you know, the nice house, the new car, the holidays, the reputation and so on), well, how does that tie in with what everyone tells us that the "good" people do?
Don't good people give their time and money to charitable activities?
When good people get money, don't they give it to the poor people?
Doesn't that make them poor too?
Isn't it good to be poor? Isn't that what we're told when we're small? I mean...
...won't us poor folk eventually inherit the earth or something?
Now, I don't mind admitting, I wasn't sure about inheriting the earth, but an advance payment wouldn't have gone amiss!
What is Spirituality?
Let's build up from basics. Here's how it goes:
Spirit
...What is Spirituality?...picture courtesy PDP
If we want to define "Spirit", there are two essential aspects:
Spirit is incorporeal; It is body-less, floating about, free of any physical encumbrance. (Think of a ghost that wanders through walls etc.)
Spirit is the "essence" of a thing;It is the defining elements, the core of a thing, the identifying aspects, the real, often unchanging centre of a thing. So we talk about a child being a "happy" spirit, or a neighbour being a "kindly" spirit.
Spiritual
If we talk about someone being spiritual, what we are saying is that they are operating or acting from their spirit, from their core. They are acting from their own "truth" of who they are.
We understand that at some level they recognise and have an awareness of their own "truth". A large part of that "truth" is that their "essence" defines a great deal of who they are, what they do, and how they live their life. And, from that perspective, they are able to have some awareness of the "truth" (or true nature, or essence) of other people, and other existences.
...we exist inseparably with those things...picture courtesy PDP
In other words, we start to see ourselves as one life that cannot exist separately from other lives.
We have an individual existence and we have a joint existence.
And those two existences cannot exist independently.
I cannot exist without interacting with other existences - not necessarily people, a dog has an existence, a tree has an existence, a rock has an existence. If we deepen our understanding of the spirit of those things then we also deepen our understanding of ourselves, because we exist inseparably with those things.
"Yes, but isn't 'spirit' something to do with God? Or religion? Or something like that?" I hear you ask.
The answer is both yes, and no!
Some people believe in a deity or deities that created the universe and everything in it, including humankind. In exploring the nature of this 'god', (and I use the term generically, and singular implying plural as required) common themes emerged.God is:
creative
omnipotent (all-powerful)
omnipresent (present everywhere)
all-knowing
and significantly, always the same, never-changing, constant in essence.
In short, 'god', has essence and an existence that can only be incorporeal - body-less. 'God' has to be 'spirit' to accommodate a 'god-nature'!
If someone acted in accordance with the predominant, widely accepted, conventional ideas of what constituted 'god', i.e. what a religion proclaimed 'god' to be, that person's spirit was likened to the 'god-spirit'. They were, 'spiritual'.
Spirituality
So, at last, What is Spirituality?
Spirituality is the actual act of acting from the core, from their own awareness of who they really are.
It may help to point out that answering "What is Spirituality?" is the process of acting from the core, whilst "Spiritual" is the nature of acting from the core.
Spirituality is concerned with "what" the act is; spiritual is concerned with "how" the acting from the core is done.
So how does Spirituality figure in success?
Having tackled "What is Spirituality?", we need to explore its benefits, especially in relation to how it can make our lives better.
Spirituality gives us other perspectives on life. And sometimes, other perspectives can help us.
So far through the Success Foundations section of this site, we've looked at our lives from:
a physical perspective,
an intellectual perspective and
an emotional perspective.
By and large, those perspectives look at life from the point of view of the individual. The individual assessing their own physical existence, their own intellect and rational mind, and their own emotions.
A spiritual perspective however sees an individual life as being inseparable from all other existences.
A spiritual perspective lets us share that common existence, and allows us to see our individual life from the perspective of those around us in a deep and meaningful way.
We can assess what our boss, our partner, our parents, our children, our neighbours, our dog, our garden, our car, could determine about the essence of our being by observing the way we talk, the way we act, the way we express ourselves.
In being able to see ourselves from those perspectives, we open ourselves to a feedback mechanism that allows us to adjust the way we present ourselves to the world.
If we return to our idea of a creative, omnipotent, omnipresent, all-knowing and constant 'god', we can also conjecture a look at our life from the perspective of 'god', and in so doing, move our spirit closer to that god-ideal. In essence (no pun intended), spirituality moves us closer to being more 'god'-like! It moves us toward being creative, omnipotent, omnipresent, all-knowing and constant.
That's not such a bad thing!
Here's the clever incidental bit about understanding "What is Spirituality?"
It is in developing those different ways of "seeing" how others see us - our spirit - that we start to discover, develop and understand things like:
our core beliefs
other people's belief systems
values
our thought processes
hunches
co-incidences
synchronicity
intuition
symbolic meanings
psychic phenomena
lucid dreaming
precognitive dreaming
mind reading
remote viewing
faith healing
holistic healing
Of course, the list is not complete. Exploring spirituality is an ongoing voyage of discovery. Much of what you'll learn along the way will help in understanding and reaching success. But, in the final analysis, your spiritual nature - your "spirituality" - is unique to you, that voyage of discovery is unique to you.
That means, that you are the only person who can really answer "What is Spirituality? |
Value Required,Key WLAN_Identifier (\d+)
Value Key WLAN_Guest_Identifier (\d+)
Value Key WLAN_Remote_Identifier (\d+)
Value Required,Key WLAN_Profile (.*)
Value WLAN_SSID (.*)
Value WLAN_Status (.*)
Value WLAN_MACFilter (.*)
Value WLAN_Broadcast (.*)
Value WLAN_AAAOverride (.*)
Value WLAN_RadiusProfiling (.*)
Value WLAN_RadiusProfilingDHCP (.*)
Value WLAN_RadiusProfilingHTTP (.*)
Value WLAN_LocalProfiling (.*)
Value WLAN_LocalProfilingDHCP (.*)
Value WLAN_LocalProfilingHTTP (.*)
Value WLAN_RadiusNACState (.*)
Value WLAN_SNMPNACState (.*)
Value WLAN_QuarantineVLAN (.*)
Value WLAN_MaximumClientsAllowed (.*)
Value WLAN_SecurityGroupTTag (.*)
Value WLAN_MaximumNumberClientsAPRadio (.*)
Value WLAN_ATFPolicy (.*)
Value WLAN_ExclusionlistTimeout (.*)
Value WLAN_SessionTimeout (.*)
Value WLAN_UserIdleTimeout (.*)
Value WLAN_SleepClient (.*)
Value WLAN_SleepClientTimeout (.*)
Value WLAN_WebAuthCaptiveBypassMode (.*)
Value WLAN_UserIdleThreshold (.*)
Value WLAN_NASIdentifier (.*)
Value WLAN_CHDperWLAN (.*)
Value WLAN_WebauthDHCPexclusion (.*)
Value WLAN_Interface (.*)
Value WLAN_MulticastInterface (.*)
Value WLAN_IngressInterface (.*)
Value WLAN_IPv4ACL (.*)
Value WLAN_IPv6ACL (.*)
Value WLAN_Layer2ACL (.*)
Value WLAN_DNSStatus (.*)
Value WLAN_mDNSProfileName (.*)
Value WLAN_DHCPServer (.*)
Value WLAN_CentralNATPeerPeerBlocking (.*)
Value WLAN_DHCPAddressAssignmentRequired (.*)
Value WLAN_StaticIPClientTunneling (.*)
Value WLAN_TunnelProfile (.*)
Value WLAN_QualityofService (.*)
Value WLAN_PerSSIDAverageDataRateUpStream (\d+)
Value WLAN_PerSSIDAverageDataRateDownStream (\d+)
Value WLAN_PerSSIDAverageRealtimeDataRateUpStream (\d+)
Value WLAN_PerSSIDAverageRealtimeDataRateDownStream (\d+)
Value WLAN_PerSSIDBurstDataRateUpStream (\d+)
Value WLAN_PerSSIDBurstDataRateDownStream (\d+)
Value WLAN_PerSSIDBurstRealtimeDataRateUpStream (\d+)
Value WLAN_PerSSIDBurstRealtimeDataRateDownStream (\d+)
Value WLAN_PerClientAverageDataRateUpStream (\d+)
Value WLAN_PerClientAverageDataRateDownStream (\d+)
Value WLAN_PerClientAverageRealtimeDataRateUpStream (\d+)
Value WLAN_PerClientAverageRealtimeDataRateDownStream (\d+)
Value WLAN_PerClientBurstDataRateUpStream (\d+)
Value WLAN_PerClientBurstDataRateDownStream (\d+)
Value WLAN_PerClientBurstRealtimeDataRateUpStream (\d+)
Value WLAN_PerClientBurstRealtimeDataRateDownStream (\d+)
Value WLAN_ScanDeferPriority (.*)
Value WLAN_ScanDeferTime (.*)
Value WLAN_WMM (.*)
Value WLAN_WMMUAPSDCompliantClientSupport (.*)
Value WLAN_MediaStreamMulticastDirect (.*)
Value WLAN_CCXAironetIeSupport (.*)
Value WLAN_CCXGratuitousProbeResponseGPR (.*)
Value WLAN_CCXDiagnosticsChannelCapability (.*)
Value WLAN_Dot11PhoneMode7920 (.*)
Value WLAN_WiredProtocol (.*)
Value WLAN_PassiveClientFeature (.*)
Value WLAN_PeertoPeerBlockingAction (.*)
Value WLAN_RadioPolicy (.*)
Value WLAN_DTIM80211a (.*)
Value WLAN_DTIM80211b (.*)
Value List WLAN_RADIUSAuthentication (.*)
Value List WLAN_RADIUSAccounting (.*)
Value WLAN_RADUISDynamicInterface (.*)
Value WLAN_RADIUSDynamicInterfacePriority (.*)
Value WLAN_LocalEAPAuthentication (.*)
Value WLAN_RADIUSNAIRealm (.*)
Value WLAN_MuMimo (.*)
Value WLAN_Security80211Authentication (.*)
Value WLAN_SecurityFTSupport (.*)
Value WLAN_SecurityStaticWEPKeys (.*)
Value WLAN_Security8021X (.*)
Value WLAN_SecurityWPAWPA2 (.*)
Value WLAN_SecurityWPA (.*)
Value WLAN_SecurityWPATKIP (.*)
Value WLAN_SecurityWPAAES (.*)
Value WLAN_SecurityWPA2 (.*)
Value WLAN_SecurityWPA2TKIP (.*)
Value WLAN_SecurityWPA2AES (.*)
Value WLAN_SecurityWPA2CCMP256 (.*)
Value WLAN_SecurityWPA2GCMP128 (.*)
Value WLAN_SecurityWPA2GCMP256 (.*)
Value WLAN_SecurityOSEN (.*)
Value WLAN_SecurityAKM8021X (.*)
Value WLAN_SecurityAKMPSK (.*)
Value WLAN_SecurityAKMCCKM (.*)
Value WLAN_SecurityAKMFT1X (.*)
Value WLAN_SecurityAKMFTPSK (.*)
Value WLAN_SecurityAKMPMF1X (.*)
Value WLAN_SecurityAKMPMFPSK (.*)
Value WLAN_SecurityOSEN1X (.*)
Value WLAN_SecuritySUITEB1X (.*)
Value WLAN_SecuritySUITEB1921X (.*)
Value WLAN_SecurityFTReassociationTimeout (.*)
Value WLAN_SecurityFTOverTheDS (.*)
Value WLAN_SecurityGTKRandomization (.*)
Value WLAN_SecuritySKCCacheSupport (.*)
Value WLAN_SecurityCCKMTSFTolerance (.*)
Value WLAN_SecurityWiFiDirectPolicy (.*)
Value WLAN_SecurityEAPPassthrough (.*)
Value WLAN_SecurityCKIP (.*)
Value WLAN_SecurityWebBasedAuthentication (.*)
Value WLAN_SecurityWebAuthenticationTimeout (.*)
Value WLAN_SecurityWebPassthrough (.*)
Value WLAN_SecurityMacAuthServer (.*)
Value WLAN_SecurityWebPortalServer (.*)
Value WLAN_Securityqrscandeskey (.*)
Value WLAN_SecurityConditionalWebRedirect (.*)
Value WLAN_SecuritySplashPageWebRedirect (.*)
Value WLAN_SecurityAutoAnchor (.*)
Value WLAN_FlexConnectLocalSwitching (.*)
Value WLAN_FlexConnectCentralAssociation (.*)
Value WLAN_FlexConnectCentralDhcpFlag (.*)
Value WLAN_FlexConnectNatPatFlag (.*)
Value WLAN_FlexConnectDnsOverrideFlag (.*)
Value WLAN_FlexConnectPPPoEPassThrough (.*)
Value WLAN_FlexConnectLocalSwitchingIPSourceGuard (.*)
Value WLAN_FlexConnectVlanbasedCentralSwitching (.*)
Value WLAN_FlexConnectLocalAuthentication (.*)
Value WLAN_FlexConnectLearnIPAddress (.*)
Value WLAN_ClientMFP (.*)
Value WLAN_MFP (.*)
Value WLAN_PMFAssociationComebackTime (.*)
Value WLAN_PMFSAQueryRetryTimeout (.*)
Value WLAN_TkipMICCountermeasureHolddownTimer (.*)
Value WLAN_EapParams (.*)
Value WLAN_AVCVisibilty (.*)
Value WLAN_AVCProfileName (.*)
Value WLAN_OpenDnsProfileName (.*)
Value WLAN_OpenDnsWlanMode (.*)
Value WLAN_FlowMonitorName (.*)
Value WLAN_SplitTunnel (.*)
Value WLAN_CallSnooping (.*)
Value WLAN_RoamedCallReAnchorPolicy (.*)
Value WLAN_SIPCACFailSend486BusyPolicy (.*)
Value WLAN_SIPCACFailSendDisAssociationPolicy (.*)
Value WLAN_KTSbasedCACPolicy (.*)
Value WLAN_AssistedRoamingPredictionOptimization (.*)
Value WLAN_80211kNeighborList (.*)
Value WLAN_80211kNeighborListDualBand (.*)
Value WLAN_80211vDirectedMulticastService (.*)
Value WLAN_80211vBSSTransitionIdleService (.*)
Value WLAN_80211vBSSTransitionService (.*)
Value WLAN_80211vBSSTransitionDisassocImminent (.*)
Value WLAN_80211vBSSTransitionDisassocTimer (.*)
Value WLAN_80211vBSSTransitionOpRoamDisassocTimer (.*)
Value WLAN_BandSelect (.*)
Value WLAN_LoadBalancing (.*)
Value WLAN_MulticastBuffer (.*)
Value WLAN_UniversalApAdmin (.*)
Value WLAN_BroadcastTagging (.*)
Value WLAN_PRP (.*)
Value WLAN_QoSFastlaneStatus (.*)
Value WLAN_SelectiveReanchoringStatus (.*)
Value WLAN_LobbyAdminAccess (.*)
Value WLAN_SDAFabricStatus (.*)
Value WLAN_SDAVnidName (.*)
Value WLAN_SDAVnid (.*)
Value WLAN_SDAAppliedSGTTag (.*)
Value WLAN_SDAPeerIpAddress (.*)
Value WLAN_SDAFlexAclName (.*)
Value WLAN_SDAFlexAvcPolicyName (.*)
Start
^\s*(WLAN|Guest\s+LAN|Remote\s+LAN)\s+Identifier -> Continue.Record
# For concatenated output, on first entry the Continue.Record won't do a Record line Value is empty and Required.
# This reliable than looking for some ending line that might not exist in every case/code-release.
^\s*WLAN\s+Identifier\s*[\.]+\s*${WLAN_Identifier}
^\s*Guest\s+LAN\s+Identifier\s*[\.]+\s*${WLAN_Identifier} -> Continue
^\s*Remote\s+LAN\s+Identifier\s*[\.]+\s*${WLAN_Identifier} -> Continue
^\s*Guest\s+LAN\s+Identifier\s*[\.]+\s*${WLAN_Guest_Identifier}
^\s*Remote\s+LAN\s+Identifier\s*[\.]+\s*${WLAN_Remote_Identifier}
^\s*Profile\s+Name\s*[\.]+\s*${WLAN_Profile}
^\s*Network\s+Name\s+\(SSID\)\s*[\.]+\s*${WLAN_SSID}
^\s*Status\s*[\.]+\s*${WLAN_Status}
^\s*MAC\s+Filtering\s*[\.]+\s*${WLAN_MACFilter}
^\s*Broadcast\s+SSID\s*[\.]+\s*${WLAN_Broadcast}
^\s*AAA\s+Policy\s+Override\s*[\.]+\s*${WLAN_AAAOverride}
# Network Admission Control
# Client Profiling Status
^\s*Radius\s+Profiling\s*[\.]+\s*${WLAN_RadiusProfiling} -> RadiusProfiling
^\s*Local\s+Profiling\s*[\.]+\s*${WLAN_LocalProfiling} -> LocalProfiling
^\s*Radius-NAC\s+State\s*[\.]+\s*${WLAN_RadiusNACState}
^\s*SNMP-NAC\s+State\s*[\.]+\s*${WLAN_SNMPNACState}
^\s*Quarantine\s+VLAN\s*[\.]+\s*${WLAN_QuarantineVLAN}
^\s*Maximum\s+Clients\s+Allowed\s*[\.]+\s*${WLAN_MaximumClientsAllowed}
^\s*Security\s+Group\s+Tag\s*[\.]+\s*${WLAN_SecurityGroupTTag}
^\s*Maximum\s+number\s+of\s+Clients\s+per\s+AP\s+Radio\s*[\.]+\s*${WLAN_MaximumNumberClientsAPRadio}
^\s*ATF\s+Policy\s*[\.]+\s*${WLAN_ATFPolicy}
# Number of Active Clients......................... 2
^\s*Exclusionlist\s+Timeout\s*[\.]+\s*${WLAN_ExclusionlistTimeout}
^\s*Session\s+Timeout\s*[\.]+\s*${WLAN_SessionTimeout}
^\s*User\s+Idle\s+Timeout\s*[\.]+\s*${WLAN_UserIdleTimeout}
^\s*Sleep\s+Client\s*[\.]+\s*${WLAN_SleepClient}
^\s*Sleep\s+Client\s+Timeout\s*[\.]+\s*${WLAN_SleepClientTimeout}
^\s*Web\s+Auth\s+Captive\s+Bypass\s+Mode\s*[\.]+\s*${WLAN_WebAuthCaptiveBypassMode}
^\s*User\s+Idle\s+Threshold\s*[\.]+\s*${WLAN_UserIdleThreshold}
^\s*NAS-identifier\s*[\.]+\s*${WLAN_NASIdentifier}
^\s*CHD\s+per\s+WLAN\s*[\.]+\s*${WLAN_CHDperWLAN}
^\s*Webauth\s+DHCP\s+exclusion\s*[\.]+\s*${WLAN_WebauthDHCPexclusion}
^\s*Interface\s*[\.]+\s*${WLAN_Interface}
^\s*Multicast\s+Interface\s*[\.]+\s*${WLAN_MulticastInterface}
^\s*Ingress\s+Interface\s*[\.]+\s*${WLAN_IngressInterface}
^\s*WLAN\s+IPv4\s+ACL\s*[\.]+\s*${WLAN_IPv4ACL}
^\s*WLAN\s+IPv6\s+ACL\s*[\.]+\s*${WLAN_IPv6ACL}
^\s*WLAN\s+Layer2\s+ACL\s*[\.]+\s*${WLAN_Layer2ACL}
^\s*mDNS\s+Status\s*[\.]+\s*${WLAN_DNSStatus}
^\s*mDNS\s+Profile\s+Name\s*[\.]+\s*${WLAN_mDNSProfileName}
^\s*DHCP\s+Server\s*[\.]+\s*${WLAN_DHCPServer}
^\s*Central\s+NAT\s+Peer-Peer\s+Blocking\s*[\.]+\s*${WLAN_CentralNATPeerPeerBlocking}
^\s*DHCP\s+Address\s+Assignment\s+Required\s*[\.]+\s*${WLAN_DHCPAddressAssignmentRequired}
^\s*Static\s+IP\s+client\s+tunneling\s*[\.]+\s*${WLAN_StaticIPClientTunneling}
^\s*Tunnel\s+Profile\s*[\.]+\s*${WLAN_TunnelProfile}
^\s*Quality\s+of\s+Service\s*[\.]+\s*${WLAN_QualityofService}
^\s*Per-SSID\s+Rate\s+Limits\s*[\.]+\s*Upstream\s+Downstream -> PerSSIDRateLimits
^\s*Per-Client\s+Rate\s+Limits\s*[\.]+\s*Upstream\s+Downstream -> PerUserRateLimits
^\s*Scan\s+Defer\s+Priority\s*[\.]+\s*${WLAN_ScanDeferPriority}
^\s*Scan\s+Defer\s+Time\s*[\.]+\s*${WLAN_ScanDeferTime}
^\s*WMM\s*[\.]+\s*${WLAN_WMM}
^\s*WMM\s+UAPSD\s+Compliant\s+Client\s+Support\s*[\.]+\s*${WLAN_WMMUAPSDCompliantClientSupport}
^\s*Media\s+Stream\s+Multicast-direct\s*[\.]+\s*${WLAN_MediaStreamMulticastDirect}
^\s*CCX\s+-\s+AironetIe\s+Support\s*[\.]+\s*${WLAN_CCXAironetIeSupport}
^\s*CCX\s+-\s+Gratuitous\s+ProbeResponse\s+\(GPR\)\s*[\.]+\s*${WLAN_CCXGratuitousProbeResponseGPR}
^\s*CCX\s+-\s+Diagnostics\s+Channel\s+Capability\s*[\.]+\s*${WLAN_CCXDiagnosticsChannelCapability}
^\s*Dot11-Phone\s+Mode\s+\(7920\)\s*[\.]+\s*${WLAN_Dot11PhoneMode7920}
^\s*Wired\s+Protocol\s*[\.]+\s*${WLAN_WiredProtocol}
^\s*Passive\s+Client\s+Feature\s*[\.]+\s*${WLAN_PassiveClientFeature}
^\s*Peer-to-Peer\s+Blocking\s+Action\s*[\.]+\s*${WLAN_PeertoPeerBlockingAction}
^\s*Radio\s+Policy\s*[\.]+\s*${WLAN_RadioPolicy}
^\s*DTIM\s+period\s+for\s+802.11a\s+radio\s*[\.]+\s*${WLAN_DTIM80211a}
^\s*DTIM\s+period\s+for\s+802.11b\s+radio\s*[\.]+\s*${WLAN_DTIM80211b}
^\s*Radius\s+Servers -> RadiusServers
^\s*Dynamic\s+Interface\s*[\.]+\s*${WLAN_RADUISDynamicInterface}
^\s*Dynamic\s+Interface\s+Priority\s*[\.]+\s*${WLAN_RADIUSDynamicInterfacePriority}
^\s*Local\s+EAP\s+Authentication\s*[\.]+\s*${WLAN_LocalEAPAuthentication}
^\s*Radius\s+NAI-Realm\s*[\.]+\s*${WLAN_RADIUSNAIRealm}
^\s*Mu-Mimo\s*[\.]+\s*${WLAN_MuMimo}
# Security
^\s*802.11\s+Authentication:\s*[\.]+\s*${WLAN_Security80211Authentication}
^\s*FT\s+Support\s*[\.]+\s*${WLAN_SecurityFTSupport}
^\s*Static\s+WEP\s+Keys\s*[\.]+\s*${WLAN_SecurityStaticWEPKeys}
^\s*802.1X\s*[\.]+\s*${WLAN_Security8021X}
^\s*Wi-Fi\s+Protected\s+Access\s+\(WPA/WPA2\)\s*[\.]+\s*${WLAN_SecurityWPAWPA2}
^\s*WPA\s+\(SSN\s+IE\)\s*[\.]+\s*${WLAN_SecurityWPA} -> WPA_Block
^\s*WPA2\s+\(RSN\s+IE\)\s*[\.]+\s*${WLAN_SecurityWPA2} -> WPA2_Block
^\s*OSEN\s+IE\s*[\.]+\s*${WLAN_SecurityOSEN}
^\s*Auth\s+Key\s+Management
^\s*802.1x\s*[\.]+\s*${WLAN_SecurityAKM8021X}
^\s*PSK\s*[\.]+\s*${WLAN_SecurityAKMPSK}
^\s*CCKM\s*[\.]+\s*${WLAN_SecurityAKMCCKM}
^\s*FT-1X\(802.11r\)\s*[\.]+\s*${WLAN_SecurityAKMFT1X}
^\s*FT-PSK\(802.11r\)\s*[\.]+\s*${WLAN_SecurityAKMFTPSK}
^\s*PMF-1X\(802.11w\)\s*[\.]+\s*${WLAN_SecurityAKMPMF1X}
^\s*PMF-PSK\(802.11w\)\s*[\.]+\s*${WLAN_SecurityAKMPMFPSK}
^\s*OSEN-1X\s*[\.]+\s*${WLAN_SecurityOSEN1X}
^\s*SUITEB-1X\s*[\.]+\s*${WLAN_SecuritySUITEB1X}
^\s*SUITEB192-1X\s*[\.]+\s*${WLAN_SecuritySUITEB1921X}
^\s*FT\s+Reassociation\s+Timeout\s*[\.]+\s*${WLAN_SecurityFTReassociationTimeout}
^\s*FT\s+Over-The-DS\s+mode\s*[\.]+\s*${WLAN_SecurityFTOverTheDS}
^\s*GTK\s+Randomization\s*[\.]+\s*${WLAN_SecurityGTKRandomization}
^\s*SKC\s+Cache\s+Support\s*[\.]+\s*${WLAN_SecuritySKCCacheSupport}
^\s*CCKM\s+TSF\s+Tolerance\s*[\.]+\s*${WLAN_SecurityCCKMTSFTolerance}
^\s*Wi-Fi\s+Direct\s+policy\s+configured\s*[\.]+\s*${WLAN_SecurityWiFiDirectPolicy}
^\s*EAP-Passthrough\s*[\.]+\s*${WLAN_SecurityEAPPassthrough}
^\s*CKIP\s*[\.]+\s*${WLAN_SecurityCKIP}
^\s*Web\s+Based\s+Authentication\s*[\.]+\s*${WLAN_SecurityWebBasedAuthentication}
^\s*Web\s+Authentication\s+Timeout\s*[\.]+\s*${WLAN_SecurityWebAuthenticationTimeout}
^\s*Web-Passthrough\s*[\.]+\s*${WLAN_SecurityWebPassthrough}
^\s*Mac-auth-server\s*[\.]+\s*${WLAN_SecurityMacAuthServer}
^\s*Web-portal-server\s*[\.]+\s*${WLAN_SecurityWebPortalServer}
^\s*qrscan-des-key\s*[\.]+\s*${WLAN_Securityqrscandeskey}
^\s*Conditional\s+Web\s+Redirect\s*[\.]+\s*${WLAN_SecurityConditionalWebRedirect}
^\s*Splash-Page\s+Web\s+Redirect\s*[\.]+\s*${WLAN_SecuritySplashPageWebRedirect}
^\s*Auto\s+Anchor\s*[\.]+\s*${WLAN_SecurityAutoAnchor}
^\s*FlexConnect\s+Local\s+Switching\s*[\.]+\s*${WLAN_FlexConnectLocalSwitching}
^\s*FlexConnect\s+Central\s+Association\s*[\.]+\s*${WLAN_FlexConnectCentralAssociation}
^\s*flexconnect\s+Central\s+Dhcp\s+Flag\s*[\.]+\s*${WLAN_FlexConnectCentralDhcpFlag}
^\s*flexconnect\s+nat-pat\s+Flag\s*[\.]+\s*${WLAN_FlexConnectNatPatFlag}
^\s*flexconnect\s+Dns\s+Override\s+Flag\s*[\.]+\s*${WLAN_FlexConnectDnsOverrideFlag}
^\s*flexconnect\s+PPPoE\s+pass-through\s*[\.]+\s*${WLAN_FlexConnectPPPoEPassThrough}
^\s*flexconnect\s+local-switching\s+IP-source-guar\s*[\.]+\s*${WLAN_FlexConnectLocalSwitchingIPSourceGuard}
^\s*FlexConnect\s+Vlan\s+based\s+Central\s+Switching\s*[\.]+\s*${WLAN_FlexConnectVlanbasedCentralSwitching}
^\s*FlexConnect\s+Local\s+Authentication\s*[\.]+\s*${WLAN_FlexConnectLocalAuthentication}
^\s*FlexConnect\s+Learn\s+IP\s+Address\s*[\.]+\s*${WLAN_FlexConnectLearnIPAddress}
^\s*Client\s+MFP\s*[\.]+\s*${WLAN_ClientMFP}
^\s*PMF\s*[\.]+\s*${WLAN_MFP}
^\s*PMF\s+Association\s+Comeback\s+Time\s*[\.]+\s*${WLAN_PMFAssociationComebackTime}
^\s*PMF\s+SA\s+Query\s+RetryTimeout\s*[\.]+\s*${WLAN_PMFSAQueryRetryTimeout}
^\s*Tkip\s+MIC\s+Countermeasure\s+Hold-down\s+Timer\s*[\.]+\s*${WLAN_TkipMICCountermeasureHolddownTimer}
^\s*Eap-params\s*[\.]+\s*${WLAN_EapParams}
^\s*AVC\s+Visibilty\s*[\.]+\s*${WLAN_AVCVisibilty}
^\s*AVC\s+Profile\s+Name\s*[\.]+\s*${WLAN_AVCProfileName}
^\s*OpenDns\s+Profile\s+Name\s*[\.]+\s*${WLAN_OpenDnsProfileName}
^\s*OpenDns\s+Wlan\s+Mode\s*[\.]+\s*${WLAN_OpenDnsWlanMode}
^\s*Flow\s+Monitor\s+Name\s*[\.]+\s*${WLAN_FlowMonitorName}
# Split Tunnel Configuration
^\s*Split\s+Tunnel\s*[\.]+\s*${WLAN_SplitTunnel}
^\s*Call\s+Snooping\s*[\.]+\s*${WLAN_CallSnooping}
^\s*Roamed\s+Call\s+Re-Anchor\s+Policy\s*[\.]+\s*${WLAN_RoamedCallReAnchorPolicy}
^\s*SIP\s+CAC\s+Fail\s+Send-486-Busy\s+Policy\s*[\.]+\s*${WLAN_SIPCACFailSend486BusyPolicy}
^\s*SIP\s+CAC\s+Fail\s+Send\s+Dis-Association\s+Policy\s*[\.]+\s*${WLAN_SIPCACFailSendDisAssociationPolicy}
^\s*KTS\s+based\s+CAC\s+Policy\s*[\.]+\s*${WLAN_KTSbasedCACPolicy}
^\s*Assisted\s+Roaming\s+Prediction\s+Optimization\s*[\.]+\s*${WLAN_AssistedRoamingPredictionOptimization}
^\s*802.11k\s+Neighbor\s+List\s*[\.]+\s*${WLAN_80211kNeighborList}
^\s*802.11k\s+Neighbor\s+List\s+Dual\s+Band\s*[\.]+\s*${WLAN_80211kNeighborListDualBand}
^\s*802.11v\s+Directed\s+Multicast\s+Service\s*[\.]+\s*${WLAN_80211vDirectedMulticastService}
^\s*802.11v\s+BSS\s+Max\s+Idle\s+Service\s*[\.]+\s*${WLAN_80211vBSSTransitionIdleService}
^\s*802.11v\s+BSS\s+Transition\s+Service\s*[\.]+\s*${WLAN_80211vBSSTransitionService}
^\s*802.11v\s+BSS\s+Transition\s+Disassoc\s+Imminent\s*[\.]+\s*${WLAN_80211vBSSTransitionDisassocImminent}
^\s*802.11v\s+BSS\s+Transition\s+Disassoc\s+Timer\s*[\.]+\s*${WLAN_80211vBSSTransitionDisassocTimer}
^\s*802.11v\s+BSS\s+Transition\s+OpRoam\s+Disassoc\s+Timer\s*[\.]+\s*${WLAN_80211vBSSTransitionOpRoamDisassocTimer}
# DMS DB is empty
^\s*Band\s+Select\s*[\.]+\s*${WLAN_BandSelect}
^\s*Load\s+Balancing\s*[\.]+\s*${WLAN_LoadBalancing}
^\s*Multicast\s+Buffer\s*[\.]+\s*${WLAN_MulticastBuffer}
^\s*Universal\s+Ap\s+Admin\s*[\.]+\s*${WLAN_UniversalApAdmin}
^\s*Broadcast\s+Tagging\s*[\.]+\s*${WLAN_BroadcastTagging}
^\s*PRP\s*[\.]+\s*${WLAN_PRP}
#
# Mobility Anchor List
# WLAN ID IP Address Status Priority
# ------- --------------- ------ --------
#
# 802.11u........................................ Disabled
#
# MSAP Services.................................. Disabled
#
# Local Policy
# ----------------
# Priority Policy Name
# -------- ---------------
#
^\s*QoS\s+Fastlane\s+Status\s*[\.]+\s*${WLAN_QoSFastlaneStatus}
^\s*Selective\s+Reanchoring\s+Status\s*[\.]+\s*${WLAN_SelectiveReanchoringStatus}
^\s*Lobby\s+Admin\s+Access\s*[\.]+\s*${WLAN_LobbyAdminAccess}
#
# Fabric Status
# --------------
#
^\s*Fabric\s+status\s*[\.]+\s*${WLAN_SDAFabricStatus}
^\s*Vnid\s+Name\s*[\.]+\s*${WLAN_SDAVnidName}
^\s*Vnid\s*[\.]+\s*${WLAN_SDAVnid}
^\s*Applied\s+SGT\s+Tag\s*[\.]+\s*${WLAN_SDAAppliedSGTTag}
^\s*Peer\s+Ip\s+Address\s*[\.]+\s*${WLAN_SDAPeerIpAddress}
^\s*Flex\s+Acl\s+Name\s*[\.]+\s*${WLAN_SDAFlexAclName}
^\s*Flex\s+Avc\s+Policy\s+Name\s*[\.]+\s*${WLAN_SDAFlexAvcPolicyName}
#
^\s*U3-Interface\s*[\.]+\s*
#
^\s*U3-Reporting Interval\s*[\.]+\s*
#
^\n -> Record
RadiusProfiling
^\s*DHCP\s*[\.]+\s*${WLAN_RadiusProfilingDHCP}
^\s*HTTP\s*[\.]+\s*${WLAN_RadiusProfilingHTTP} -> Start
LocalProfiling
^\s*DHCP\s*[\.]+\s*${WLAN_LocalProfilingDHCP}
^\s*HTTP\s*[\.]+\s*${WLAN_LocalProfilingHTTP} -> Start
PerSSIDRateLimits
^\s*Average\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerSSIDAverageDataRateUpStream}\s+${WLAN_PerSSIDAverageDataRateDownStream}
^\s*Average\s+Realtime\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerSSIDAverageRealtimeDataRateUpStream}\s+${WLAN_PerSSIDAverageRealtimeDataRateDownStream}
^\s*Burst\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerSSIDBurstDataRateUpStream}\s+${WLAN_PerSSIDBurstDataRateDownStream}
^\s*Burst\s+Realtime\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerSSIDBurstRealtimeDataRateUpStream}\s+${WLAN_PerSSIDBurstRealtimeDataRateDownStream} -> Start
PerUserRateLimits
^\s*Average\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerClientAverageDataRateUpStream}\s+${WLAN_PerClientAverageDataRateDownStream}
^\s*Average\s+Realtime\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerClientAverageRealtimeDataRateUpStream}\s+${WLAN_PerClientAverageRealtimeDataRateDownStream}
^\s*Burst\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerClientBurstDataRateUpStream}\s+${WLAN_PerClientBurstDataRateDownStream}
^\s*Burst\s+Realtime\s+Data\s+Rate\s*[\.]+\s*${WLAN_PerClientBurstRealtimeDataRateUpStream}\s+${WLAN_PerClientBurstRealtimeDataRateDownStream} -> Start
RadiusServers
^\s*Authentication\s*[\.]+\s*${WLAN_RADIUSAuthentication}
^\s*Accounting\s*[\.]+\s*${WLAN_RADIUSAccounting} -> Start
WPA_Block
^\s*TKIP\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPATKIP}
^\s*AES\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPAAES} -> Start
WPA2_Block
^\s*WPA2\s+\(RSN\s+IE\)\s*[\.]+\s*${WLAN_SecurityWPA2}
^\s*TKIP\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPA2TKIP}
^\s*AES\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPA2AES}
^\s*CCMP256\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPA2CCMP256}
^\s*GCMP128\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPA2GCMP128}
^\s*GCMP256\s+Cipher\s*[\.]+\s*${WLAN_SecurityWPA2GCMP256} -> Start
|
Hepatitis B and hepatitis C in emergency department patients.
Infections with hepatitis B virus (HBV), hepatitis C virus (HCV), and the human immunodeficiency virus type 1 (HIV-1) are common in inner-city populations, but their frequency and interrelations are not well established. During a six-week period, excess serum samples were collected, along with information on risk factors, from all adult patients presenting to an inner-city emergency department. The samples were assayed for hepatitis B surface antigen (HBsAg) and antibodies to HCV and HIV-1. Of the 2523 patients tested, 612 (24 percent) were infected with at least one of the three viruses. Five percent were seropositive for HBV, 18 percent for HCV, and 6 percent for HIV-1. HCV was found in 145 of the 175 intravenous drug users (83 percent), 36 of the 171 transfusion recipients (21 percent), and 5 of the 24 homosexual men (21 percent). Among black men 35 to 44 years of age, the seroprevalence of HCV was 51 percent. HBsAg was present in 9 percent of those whose only identifiable risk was possible heterosexual exposure. At least one viral marker was found in about 30 percent of the patients who were actively bleeding or in whom procedures were performed. Testing for HIV-1 alone would have failed to identify 87 percent of the patients infected with HBV and 80 percent of those infected with HCV. In a population of patients in an inner-city emergency room, HBV, HCV, and HIV-1 are all highly prevalent. However, routine screening for HIV-1 alone would identify only a small fraction of the patients who pose risks of severe viral infections, including HBV and HCV, to providers. |
Q:
What are the conditions for a NFA for its equivalent DFA to be maximal in size?
We know that DFAs are equivalent to NFAs in expressiveness power; there is also a known algorithm for converting NFAs to DFAs (unfortunately I do now know the inventor of that algorithm), which in worst case gives us $2^S$ states, if our NFA had $S$ states.
My question is: what is determining the worst case scenario?
Here's a transcription of an algorithm in case of ambiguity:
Let $A = (Q,\Sigma,\delta,q_0,F)$ be a NFA. We construct a DFA $A' = (Q',\Sigma,\delta',q'_0,F')$ where
$Q' = \mathcal{P}(Q)$,
$F' = \{S \in Q' | F \cap S \neq \emptyset \}$,
$\delta'(S,a) =\bigcup_{s \in S} (\delta(s,a) \cup \hat \delta(s,\varepsilon))$, and
$q'_0 = \{q_0\} \cup \hat \delta(q_0, \varepsilon)$,
where $\hat\delta$ is the extended transition function of $A$.
A:
The algorithm you refer to is called the Powerset Construction, and was first published by Michael Rabin and Dana Scott in 1959.
To answer your question as stated in the title, there is no maximal DFA for a regular language, since you can always take a DFA and add as many states as you want with transitions between them, but with no transitions between one of the original states and one of the new ones. Thus, the new states will not be reachable from the initial state $q_0$, so the language accepted by the automaton will not change (since $\hat\delta(q_0,w)$ will remain the same for all $w\in\Sigma^*$).
That said, it is clear that there can be no conditions on a NFA for its equivalent DFA to be maximal, since there is no unique equivalent DFA. In contrast, the minimal DFA is unique up to isomorphism.
A canonical example of a language accepted by a NFA with $n+1$ states with equivalent DFA of $2^n$ states is
$$L=\{w\in\{0,1\}^*:|w|\geq n\text{ and the \(n\)-th symbol from the last one is 1}\}.$$
A NFA for $L$ is $A=\langle Q,\{0,1\},\delta,q_0,\{q_{n+1}\}\rangle$, with $\delta(q_0,0)=\{q_0\}$, $\delta(q_0,1)=\{q_0,q_1\}$ and $\delta(q_i,0)=\delta(q_i,1)=\{q_{i+1}\}$ for $i\in\{1,\ldots,n\}$. The DFA resulting of applying the powerset construction to this NFA will have $2^n$ states, because you need to represent all $2^n$ words of length $n$ as suffixes of a word in $L$.
A:
The worst-case of $2^{s}$ comes from the number of subsets of states of the NFA. To have the algorithm from Kleene's theorem give an equivalent DFA with the worst-case number of states, there must be a way to get to every possible subset of states in the NFA. An example with two states over alphabet $\{a, b\}$ has a transition from the initial state to the sole accepting state on symbol $a$, a transition from the accepting state back to the initial on $b$, and a transition from the accepting state back to itself on either an $a$ or a $b$. The strings $\lambda$, $a$, $b$, and $ab$ lead to subsets $\{q_{1}\}$, $\{q_{2}\}$, $\{\}$, and $\{q_{1}, q_{2}\}$, respectively, and these would need separate states in the DFA Kleene gives.
|
Q:
Semantic UI: Cards next to each other?
Problem is instead of showing next to each other they are all justified to left and placed one under another. I want them to go all the way from left to right and wrap to next row if another card won't fit. The way display: flex works.
Is there any "semantic" way to do it? The only thing I can think of is placing an additional div inside the grid that will be a flex container.
I am using Meteor and Blaze but I believe it has nothing to do with it. The question lies in Semantic UI and HTML/CSS.
My HTML looks like this:
<div class="ui grid">
<div class="two wide column">
</div>
<div class="twelve wide column">
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
</div>
<div class="two wide column">
</div>
</div>
Where each card template is:
<div class="ui card">
<div class="image">
<img src="http://placehold.it/256x256">
</div>
<div class="content">
<a class="header">Kristy</a>
<div class="meta">
<span class="date">Joined in 2013</span>
</div>
<div class="description">
Kristy is an art director living in New York.
</div>
</div>
<div class="extra content">
<a>
<i class="user icon"></i>
22 Friends
</a>
</div>
</div>
A:
<div class="ui four doubling stackable cards">
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
</div>
And for the card all you need to do is change ui card to ui fluid card for the card to expand to maximum available space.
This is what I was able to find. It works very well, just as I needed it to work.
doubling gives the nice effect of going down from 4 to 2 cards per row on medium screens while stacking will go from 2 to 1 per row on small screens like phones for the ultimate viewing pleasure.
Thanks to everyone, your answers helped in finding this solution. I will mark it as answer because I believe this is the most "semantic" way of doing this.
A:
You can pop each card into its own column and surround it using a stackable grid -> http://semantic-ui.com/collections/grid.html#stackable
<div class="ui stackable twelve column grid">
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
{{> card}}
</div>
and each card is surrounded by
<div class="column">
... content
</div>
|
Deutsche Bank: my look at the charts
Deutsche Bank’s (DB) struggles have been if focus for some time but the stock featured front and centre in many trading commentaries after Thursday’s session. This piqued my interest to consider how the DB charts are shaping up at the moment and, whilst they are certainly bearish, there does seem to be some buying happening here.
DB monthly: the $20 level had been some horizontal support and was tested back in late 2008 and early 2009. This level held back then but was broken earlier this year; January 2016. There is the look of a falling wedge here though and these are often bullish-reversal patterns. Thus, watch for any wedge trend line breakout that is supported with an increase in the corresponding DMI and ADX momentum. Price is below the monthly Cloud which is bearish.
DB weekly: there is a clear pattern of lower LOWs and lower HIGHs and this would need to be broken before traders could be confident of any possible recovery. It is worth noting that both the +DMI and -DMI are above the 20 level for now and so there is a bit of buying happening out there. Price is below the weekly Cloud which is bearish and trading Volumes are increasing.
DB daily: there is a smaller descending wedge in play here on the daily chart showing lower HIGHs and lower LOWs and this pattern would need to be broken before traders could have much faith in any recovery. Like with the weekly chart though, the +DMI and -DMI are both above 20 suggesting some people are buying here. The lower chart shows a spike in trading volume on Thursday but, whilst price traded lower on the day, it closed off its LOW as further proof that someone was buying!
I would not be confident of any recovery here though until I saw the following:
the daily chart’s upper wedge trend line broken to the upside.
The ADX > 20.
The +DMI > 20.
The -DMI <20.
Price is back above the daily Ichimoku Cloud.
Summary: Deutsche Bank has been in decline, essentially, since May 2005. Price bounced up from the $20 level in 2009 but this support was broken earlier this year. Whilst the stock continues to make bearish moves with lower HIGHs and lower LOWs there are some bullish-reversal wedge trend lines in play on the daily and monthly charts as well as the suggestion of some buying in play with the +DMI trading above 20 on the daily and weekly charts, albeit only just.
Thus: Watch the daily, and then monthly, wedge patterns for any trend line breakout that evolves with an increase in the corresponding DMI and ADX momentum. |
Q:
Are you in favour of in-memory filtering or using SQL queries on large number of records in a ruby on rails app?
I'm writing a rails finder query that pulls out records for articles sorted by the highest numbers of approved and public comments per article.
Which is the best way to run such a query in Ruby on Rails?
As a general rule, are developers in favour of in-memory filtering or running complex SQL queries?
A:
Letting the database do its job is always best. Just write the query with a where clause/join/etc. and use a sort by to return only the records you need. By returning more records and then filtering the data in rails wastes the amount of the data across the "wire" (between DB and app server) and also memory. Databases are optimized for these sorts of things. Use an index on the table as necessary.
Another similar post: http://www.mail-archive.com/[email protected]/msg13484.html
A:
The slow part of a web app is almost always the database.
running complex queries would cost you a bit in time but the data provided will be meaningful and not that large.
Running basic queries will let you have a large dataset you'll have to deal with. This large amount of data could be also long to import.
I'd stick to 1 knowing that you can optimize queries and add indexes.
|
Ho boy... it seems that with every new component I add to my project, I run right into another brick wall. :/ Well, on to the current issue.
I've built a circuit that, so far, blinks LEDs and beeps a buzzer when I want it to. I'm sure that sounds ridiculously simple to most of you, but for me, it's a huge deal. I'm still a newbie, after all. Anyway, my next task is to incorporate a pushbutton into the mix, and I've got a LilyPad button board to go with my LilyPad.
So here's what I want it to do. Right now, when I provide power to the circuit, my seven LEDs turn on, I make a beep with the buzzer, and then the LEDs turn off. Lather, rinse, repeat. You get the idea. What I want to happen instead is for the loop() function to listen for a button press+release before doing anything else. When it detects that the button has been pressed and released, it will begin the LED and buzzer loop, and continue it until the button is pressed and released a second time. The whole thing will repeat the cycle: every odd button press+release results in the activity with the LEDs and Buzzer, and every even button press+release results in the activity stopping.
So here are my issues with making this happen. My first problem is that I'm very confused about where to place my resistors and how to hook the button up to my LilyPad. After reading the Arduino Button Tutorial and the Arduino Button State Change Tutorial, I'm still not quite clear. My LilyPad button board has two pin holes: one marked with an S and one marked with a -. Am I correct in ascertaining that I should connect the - side to the 10k resistor, and connect THAT to ground? Then connect the S side to the pin on my LilyPad? Do I also need a 100 resistor somewhere in there? I'm still not clear on the whole pullup vs. pulldown resistor thing.
Finally, for the code, will the code on the Arduino Button State Change Tutorial be the right place to start, or is that meant for a special kind of state-saving button instead of a momentary push-button (like I have)?
Being an adult shouldn't be about maturity; it should be about being old enough to go out and do bigger and better things with your time.
Judging from the number of views, I thought it possible that some folks were interested in the answers to my questions, but didn't really have them. For you folks, here's what I found out.
Apparently, the LilyPad Button Board is meant to be connected directly to the Lilypad pins and the ground. The S-pin of the button connects to the I/O pin of your LilyPad, and the -pin connects to ground. That part of it is extremely simple, so there we go.
As for the code, it is also surprisingly simple! I ran across this page while desperately searching for anyone with instructions on this subject, and it gave me everything I needed. Their code snippet is good for simply capturing the button presses, but it helped my purposes immensely. Thanks to all who viewed the thread. My problem is solved, however, so it is fine for this thing to fall to the depths. ^_^
Being an adult shouldn't be about maturity; it should be about being old enough to go out and do bigger and better things with your time. |
Today’s question comes from a 16 year old who wants to know what he should be focusing to get started in business. I explain the three things that anyone wanting to start a business should focus on, regardless of age. Also, Bear is growing up…
People who are miserable follow too many of other people’s rules. Today I talk about how and why you should develop your own personal values, so you can achieve a sense of fulfilment on your own terms. Do you have a question? Send it through…
As a business scales is it possible to sustain the start up DNA that makes it unique? ABSOLUTELY. Growth in business does not have to dilute who you are, instead it should amplify your businesses’ heart beat. Do you have a question? Send it through…
In this episode I answer the greatest question that has ever been asked on #AskJackD to date… and I get ANGRY at anyone who has ever made an excuse for not following their dreams. I don’t buy into excuses, and you shouldn’t let yourself either…
In this episode, Osher Ginsberg joins me to chat about work-life balance. This might shock you but I don’t believe in it. Why not? Work-life balance positions work as the enemy, which it shouldn’t be. If you align what you do with what you love…
We need to be comfortable with being uncomfortable, and with failure… but a reputation that has taken years to build can be tarnished in only seconds. So how do we fail forward, without damaging your brand? I give some tips for how to manage and…
‘Hustle’ is getting thrown around a lot at the moment. People will tell you to ‘hustle harder’ if you want to be a successful entrepreneur. This isn’t always true. It’s easy to get caught up in the day-to-day hustle; the ‘busyness’ of running a business,…
At the heart of my second book ‘Unwritten’ is the idea that the future doesn’t need to look like the past. We often believe it does, but all it takes it for one single person to come along and recognise that tomorrow doesn’t have to…
Is there a correlation between rappers and entrepreneurs? Absolutely YES. Rappers and entrepreneurs share both a creative ability and a need to create. They are two different expressions of artistry, borne from the same need to construct something that didn’t previously exist. Do you have…
Breaking news: You don’t need a morning routine to be successful. A lot of people will tell you to wake up at a certain time, eat a bowl of granola, mediate and exercise because this is what successful people do. For some that might work, but… |
Fantasy football seasons have come to an end and the fantasy world is shifting to baseball prep. We’re already in full swing here with rankings, sleepers, and all sorts of strategy articles. While the new year has just begun, drafts are well underway in our Fantrax lobby. Reading up on rankings is one of the best ways you can prepare for these drafts. Most rankings you’ll see at this time will be primarily geared toward roto leagues. That’s because roto is the more commonly played format in fantasy baseball. But if you’re like me and enjoy a good points league, you have to know how player values change and adjust those rankings accordingly. Let’s take a look at how players gain and lose value in these leagues.
If you’re like us you can’t wait until spring to get the 2020 fantasy baseball season started? Well, you don’t have to. Leagues are already forming at Fantrax.com, so head on over and start or join a league today.
How to Value Players in Points Leagues
What is a points league?
Let’s get some basics out of the way. Points leagues are leagues in which particular stats are given point values. Usually played in a weekly head-to-head style, players accumulate points through the course of the week. The fantasy team that accumulates the most points at the end of the week wins the matchup. Easy enough to understand. It’s the best transition for new players who might have had prior fantasy experience in football. Heck, it was my introduction to fantasy baseball and what ultimately got me hooked on this game.
How is it different than a Roto league?
Roto leagues are assigned statistical categories that players must accumulate throughout the season. Leading a particular category will net you more standings points. The more categories you lead or are near the top in, the higher in the standings your team will be. So while you accumulate stats in roto, you accumulate points with those stats in points leagues.
In a roto league, being weak in a particular stat can hurt you in the standings. On the other hand, in points leagues, it doesn’t matter what your players do to accumulate points, only that it’s more than your opponent. This is huge in drafts and can drastically change values and strategy. Seven rounds in and don’t have any steals yet? In a roto league, you’d be in trouble. In a points league, you don’t have to worry about that. Instead of reaching for a steals source, you can take the best player available. The bottom line is that you don’t need to be conscious of which statistical category you need. Instead of being limited to five or six categories, players are awarded for just about anything they do on the field offensively.
Now that we’ve got the general idea of how these leagues are different out of the way, let’s look at how player values change.
Hitting in Points Leagues
As I mentioned before, in roto leagues, you want to have a balanced roster. You want a set of players that are going to collectively help you in every category. The thing is, those categories can differ from league to league. Some could count average while others side with on-base percentage, changing player values. In a points league, both types of players can be valuable, because again, it doesn’t matter how you score.
Because of the head-to-head nature of the format, consistency is key. Part of being consistent as a hitter is plate discipline. Hitters that have a good BB/K ratio tend to perform better in points leagues. Walks are usually scored the same as a single. So players that walk a lot tend to score more points. You can think of walk rates as a baseline for how often a hitter is going to score at least a point while at the plate. Strikeouts can sometimes cost you a point, so that’s another thing to keep in mind.
Take Danny Santana for example. Santana finished the season with a 29.5% strikeout rate and a 4.9% walk rate for a BB/K of 0.17. In Fantrax Best Ball leagues, which are points-based, Santana finished as the 65th ranked hitter. In Fantrax Draft and Holds, roto-based leagues, Santana’s 28 home runs and 21 steals had him finish as the 33rd ranked hitter. His plate discipline was atrocious, pushing him down in points leagues.
On the other side of things, Carlos Santana finished as the 19th best hitter in these points leagues in part due to his excellent BB/K ratio of 1.00. He was no slouch in roto as he finished 27th but there was still quite a disparity between league types.
Another stat to look at when valuing players in points leagues is slugging percentage. Home runs are without a doubt the most valuable hitting stat in points leagues. You want sluggers. Not only do home runs play up in points leagues, but so do extra-base hits. This isn’t typically accounted for in roto leagues, but doubles are worth twice as many points as a single. So a player that can hit a ton of doubles is going to gain value in points leagues. Take Nicholas Castellanos for example. Castellanos was nice but unspectacular in roto with a ranking of 69. But, he gained a full 10 spots in points leagues at 59 because of his MLB-leading 58 doubles.
Other examples of hitters that gain value in points leagues include Andrew McCutchen, Michael Brantley, Michael Conforto, Max Muncy, and Rhys Hoskins.
Pitching in Points Leagues
Pitching is absolutely vital in points leagues. Last year, Gerrit Cole and Justin Verlander were by far the highest-scoring players. The keys to pitching in points leagues are volume and strikeouts, period. You aren’t necessarily worried about your ratios in points leagues. At the end of the day, it doesn’t matter what your WHIP or ERA were, as long as your pitchers accumulated more points. A 4.50 ERA isn’t going to help you in a roto league, but that’s the baseline ERA for quality starts. Quality starts can be quite valuable in points leagues.
One prime example of this is Marcus Stroman, who finished with 18 quality starts in 2019. Stroman ranked as the 40th pitcher in Fantrax Best Ball points leagues and 52nd in the Draft and Hold roto leagues. Trevor Bauer is another high volume pitcher that gains value in points leagues. He finished 14th in the format last season and 24th in roto. The more innings a pitcher throws, the more likely he is to accumulate quality starts, wins, and strikeouts. That’s what it comes down to. Volume and strikeouts are king.
Part of accumulating volume in pitching is having a roster catered for it. In points leagues, I like to have as many pitchers on my roster as possible. There’s really no point in having a bench full of hitters. They can’t help you from the bench and most of the time you’re going to beat yourself up over who to start. Holding pitchers on your bench gives you more chances to have two-start pitchers from week to week. Having plenty of two-start options throughout the year can carry you to your head-to-head playoffs, especially in weekly lineup leagues. So here’s what you do. Draft some multi-eligible hitters so that you can roster as few bats on your bench as possible. Load up of pitching. Profit.
Another set of pitchers that gain value in points leagues are starting pitchers with relief pitcher eligibility. Relievers can be extremely volatile, not only in their performance but in how often they are used. Even the best closers can go a week with little usage depending on team context. But if you have a starter that is eligible as a reliever, they could provide a safe point floor for the week. Also, it gives you another shot at having a two-start pitcher. Some examples of these include Kenta Maeda, Ryan Yarbourgh, Yonny Chirinos, Adrian Houser, and Brad Peacock.
Now that we’ve covered some info on points leagues, the lobby is waiting for you. Join me and jump into a Best Ball league.
For more great rankings, strategy, and analysis check out the 2020 FantraxHQ Fantasy Baseball Draft Kit. We’ll be adding more content from now right up until Opening Day!
Fantrax is one of the fastest-growing fantasy sites of 2018/2019 and we’re not stopping anytime soon! With multi-team trades, designated commissioner/league managers, and drag/drop easy click methods, Fantrax is sure to excite the serious fantasy sports fan – sign up now for a free year at Fantrax.com. |
Rhys Vaughan
Rhys Vaughan was the member of Parliament for the constituency of Merioneth in 1545.
References
Category:Members of Parliament for Merioneth
Category:Members of the Parliament of England (pre-1707) for constituencies in Wales
Category:Year of birth missing
Category:Year of death missing |
Three years ago, the world came to know of the existence of humanoid beast creatures after the government decided to stop hiding their existence from the world. It was decided that they would be integrated into human society, and thus the "Cultural Exchange Between Species Bill" was created. Since then, the cultural exchange program became a huge success helping many species integrate into human society.
Kurusu Kimihito is a volunteer (?) in this exchange program who has been given a Lamia (Snake Girl) named Miia to take care of. After spending some time together, Miia has fallen in love with Kurusu, which isn't a bad thing per se. However, there is a stipulation in the exchange program that prohibits interbreeding between humans and beast creatures. Violating this law results in a severe punishment for the human. Will Kurusu be able to resist Miia's advances and keep himself out of trouble?
Also, I have a bit of a gripe that okayado put suu in a tight suit and didn't make any use of it.
On a side note, am I the only one who imagines that potemkin guy with a russian accent?
Signed "O"...huh, this is the ocean too...welp
Spoiler
I knew this was coming since page 8, they said she was being stalked by a scylla named oct (scylla's a greek myth), also okayado bases most of his monsters from kenkou cross's "monster girl encyclopedia", and sure enough, there's a scylla in it (look it up, image is more SFW than this manga, but it's still an ero book so... yeah)
My Logic- I guess she shimmied it up from the bottom, then the straps have plastic hooks on the inside. She wouldn't have to get it over her arms, just over her hips to her chest. The problem would be more with how she hooked it, but someone else could have helped with that (in a completely yuri-tease way that's to be expected from this manga). |
Far Cry 2 Hands-On
We grab a gun and hit the African savannah in our first hands-on look at Ubisoft's shooter sequel.
Last updated by
on May 28, 2008 at 11:05AM
Related
Can't Get Enough %gameName%?
No spam, no fuss; just the latest updates delivered right to you.
You're Good to Go!
We'll begin emailing you updates about %gameName%.
Follow
A mixture of cutting-edge graphics, open-ended gameplay, and sophisticated artificial intelligence made the original Far Cry a hit on the PC. For Far Cry 2, the development team at Ubisoft Montreal is still keeping those essential ingredients--gorgeous, lush environments, tricky AI, and a sandbox mentality--intact while changing up all the surrounding elements, such as the setting, storyline, and characters, to keep things fresh. As a result, when we first got our hands on the game at Ubisoft's recent spring press event, we felt like it was running into an old friend who had recently spent a load of cash on a wardrobe upgrade.
Things blow up real nice in Far Cry 2.
Far Cry 2's story has seemingly no ties to the original game, even if the protagonists in both games have the standard "square-jawed white guy" look about them. In the original, you fought it out in a tropical setting looking to rescue a mysterious woman from harm. In the sequel, you play as a mercenary whose goal is to take down an arms dealer known as The Jackal. Little is known about him, except that he's profiting greatly while perpetuating a conflict in the African savannah where the game takes place. As you hunt down The Jackal, you'll be caught in the middle of various and conflicting interests of multiple factions involved in the war. Which sides you work with and against will go a long way in determining your path through this multifaceted storyline.
The demo on hand at the Ubisoft event began overlooking a green, murky-looking swamp. Our first goal was to meet up with our point of contact, Frank, in a shack near the stating point. He was looking for our help in an operation he was planning, and our portion of it was to take down a nearby radio antenna that was broadcasting propaganda for one of the local factions.
After agreeing to the mission from Frank, we also met up with Warren, one of many non-player characters you'll run into in the game. Far Cry 2's open-ended nature is designed so that you can play the game any way you want--that extends to which characters you help in the game and which ones you ignore. If you decide to help out a character, he might be available to you later as a buddy. By chatting with Warren, he ensured his assistance should things get too hairy out in the field. It wouldn't be long before we needed to take him up on his offer.
As with the original game, vehicles look to play a big role in the missions of Far Cry 2. As soon as we left Frank's shack with the mission in mind, we hopped into a jeep (loaded with a convenient mounted machine gun on the rear) and began speeding toward our destination. Though you always have a map on hand to check for your mission locales, one cool touch is that the occasional street signs you run into in villages will illuminate in the direction of your goal. We made a few turns and, around the last bend, came to our first objective: a walled enemy encampment full of bad guys that were just begging to be filled full of bullets.
See? Told you.
The problem with helping those enemies fulfill their bullet-riddled destiny, of course, is Far Cry 2's clever AI--one that demands equal measures of stealth and brutality to overcome. We tried the first encampment several times during the course of our demo with Far Cry 2--everything from the sneaking in and trying to keep things quiet (which didn't hold for long) to blasting though the front gates in our jeep and trying to run down enemies like they were dogs in the streets. Neither approach we took was met with perfect success. Thanks to enemies who were keen to take cover and deadly shots, we ended up dying several times in the process.
It's lucky for us, then, that we had Warren on our side. Because we chatted with Warren before the mission began and he had pledged his support to us, Warren was on hand to revive us, get us moving again, and give us a gun to continue the fight when we managed to get ourselves shot up in the mission. While you can only use these "buddy save" moments once, you can always go back and talk to your friend again to reset it for the next time you run into trouble.
Once you've been revived by a buddy, he'll also be available to help you with cleaning up any remaining enemies on hand. While Warren didn't appear to be the best shot in the world, it was imminently satisfying to flank enemies, catch them in crossfire, and mow them down. Enemy AI in Far Cry 2 is sophisticated enough that it will help out injured comrades if given a chance. So, when in doubt, put a few more bullets in the bad guys.
It's not all bullets and explosions; sometimes you need to get up close and personal.
The goal in the encampment was to blow up a water tank to create a diversion for the enemy, then move further down the nearby river to seek out the radio antenna. Once we took out the water supply with some explosives, we climbed down to the river and found a small boat, which we piloted down a winding section of water. We halfway expected an ambush as we made our way down the river but managed to make it to the shore safely. Then it was up a hill and time to take down another small village full of bad guys.
Things can get hairy very quickly in Far Cry 2. In addition to the aforementioned clever AI, the game features impressive explosion effects and fire that can quickly spread throughout the straw buildings of an African village. We managed to create enough chaos with our weapon load out of grenades and assault rifles to lay waste to the village. Then we grabbed another jeep and headed on to the next stage of the mission before finally locating the radio antenna and taking it down with a few timed explosives.
Though we took a fairly direct route from one objective to the next in our demo with Far Cry 2, the playable area looks to be large enough to allow plenty of variety in how different players will attack the same objective. On the missions we completed, for example, you could take the roads we did, bypassing the river altogether, or cut through a nearby diamond mine to reach the final objective. Naturally, you'll run into resistance wherever you go, but the choice will be yours.
The size of the playable map in Far Cry 2 will grow as you unlock areas, with the ultimate playable area running somewhere in the 50-square-kilometer range. It won't just be dry savannah in the game either--developers are promising a variety of terrain and environments, including jungle, desert, and urban landscapes as well. The mission types will vary too; in addition to "find and destroy" missions like the one above, developers are promising a variety of mission types, such as intimidation, or missions where you must burn a field full of crops meant for an enemy army. In addition there are around 50 side quests which run the gamut from rescuing civilians in hiding to tracking and assassinating specific high-value targets.
Producers were mum on the specific online multiplayer details in the game but did say that the game will include a full map editor on the PC and console versions of the game. We didn't get to see the map editor in action, but we do know that created maps will be a maximum of 512 X 512 in size and players will able to download and rate the creations of others.
Hang gliding into a village and laying waste to the bad guys. Welcome to Far Cry 2.
Weaponry in Far Cry 2 will include such weapons as pistols, assault rifles, and shotguns, as well as more exotic weaponry, such as flamethrowers, rocket-propelled grenades, and improvised explosive devices. Bullets will be able to penetrate flimsier materials so that cover won't always keep you safe and, amusingly, some weapons will jam from time to time, and you'll have to give your weapon a few whacks to dislodge it.
Following up on one of the more critically successful games in Ubisoft's recent history is no small task for the developers at Ubisoft Montreal. From what we've seen, the go-anywhere, do-(almost)-anything approach is still intact with Far Cry 2. We're curious to see how the game's main character will interact with the various factions vying for control in the game, as well as how far-reaching decisions you make will affect the storyline. Far Cry 2 is currently scheduled for release later this year. |
thanks fellas. i will cover the $510. |
Soyuz TM-4
Soyuz TM-4 was the fourth crewed spacecraft to dock with the space station Mir. It was launched in December 1987, and carried the first two crew members of the third long duration expedition, Mir EO-3. These crew members, Vladimir Titov and Musa Manarov, would stay in space for just under 366 days, setting a new spaceflight record. The third astronaut launched by Soyuz TM-4 was Anatoli Levchenko, who returned to Earth about a week later with the remaining crew of Mir EO-2. Levchenko was a prospective pilot for the Soviet Space shuttle Buran. The purpose of his mission, named Mir LII-1, was to familiarize him with spaceflight.
It was the fourth Soyuz TM spacecraft to be launched (one of which wasn't crewed), and like other Soyuz spacecraft, it was treated as a lifeboat for the station's crew while docked. In June 1988, part way through EO-3, Soyuz TM-4 was swapped for Soyuz TM-5 as the station's lifeboat. The mission which swapped the spacecraft was known as Mir EP-2, and had a three-person crew.
Crew
Titov and Manarov were members of the long duration mission Mir EO-3, and returned to Earth just over a full year later, in Soyuz TM-6. Levchenko, on the other hand, returned to Earth about a week later in Soyuz TM-3.
In June 1988, Soyuz TM-4 landed the three-man crew of Mir EP-2, after their 9-day stay on the station; that crew included the second Bulgarian astronaut Aleksandr Panayotov Aleksandrov.
Backup crew
Mission parameters
Mass: 7070 kg
Perigee: 337 km
Apogee: 357 km
Inclination: 51.6°
Period: 91.5 minutes
Mission highlights
4th crewed spaceflight to Mir. Manarov and Titov (known by their callsign as the "Okeans") replaced Romanenko and Alexandrov. Anatoli Levchenko was a cosmonaut in the Buran shuttle program. Levchenko returned with Romanenko and Alexandrov in Soyuz TM-3.
Before departing Mir, Romanenko and Alexandrov demonstrated use of EVA equipment to the Okeans. The Okeans delivered biological experiments, including the Aynur biological crystal growth apparatus, which they installed in Kvant-1. The combined crews conducted an evacuation drill, with the Mir computer simulating an emergency.
Titov and Manarov conducted part of an ongoing survey of galaxies and star groups in the ultraviolet part of the spectrum using the Glazar telescope on Kvant. The survey required photography with exposure times up to 8 min. Even small cosmonaut movements could shake the complex. This produced blurring of astronomical images, so all cosmonaut movements had to be stopped during the exposures.
References
Category:Crewed Soyuz missions
Category:1987 in spaceflight
Category:1987 in the Soviet Union
Category:Bulgaria–Soviet Union relations
Category:Spacecraft which reentered in 1988
Category:Spacecraft launched in 1987 |
Dead man hanging from high rise may be graffiti tagger
Police say there was a spray can and an etching tool found on a roof near where a man's body was found hanging from a high rise in downtown Sacramento, California.
http://archive.thedailyjournal.com/VideoNetwork/2271190093001/Dead-man-hanging-from-high-rise-may-be-graffiti-taggerhttp://bc_gvpc_od-f.akamaihd.net/media/963482463001/201304/3167/963482463001_2271183838001_f75fcc1b-8124-4f20-b52e-fb39912e1c24.mp4?pubId=44692041001&videoId=2271190093001http://archive.thedailyjournal.com/VideoNetwork/2271190093001/Dead-man-hanging-from-high-rise-may-be-graffiti-taggerhttp://bc_gvpc.edgesuite.net/img/963482463001/201304/591/963482463001_2271159860001_thumbnail-for-video-2271146063001.jpgDead man hanging from high rise may be graffiti taggerPolice say there was a spray can and an etching tool found on a roof near where a man's body was found hanging from a high rise in downtown Sacramento, California.40HungCaliforniasacramentovandalismtaggraffitiHangedvpcNational NewshangKXTV01:36
You will automatically receive the TheDailyJournal.com Top 5 daily email newsletter. If you don't want to receive this newsletter, you can change your newsletter selections in your account preferences. |
Research into the history of Football in Falkirk district : mainly concentrating on the the period up to 1945 I like to dig through the newspapers from the days of yore to find little vignettes that were rarely included in the published histories.
From the ugly side to the downright obscure, just don't expect me to write about anything too obvious ....
Tuesday, 28 June 2016
In the 19th Century Charity matches played by combined teams were far more common than they are these days, especially at the beginning and end of the seasons. The clubs in Falkirk District would often combine to play one of the Glasgow clubs or one of the surrounding counties to add to the coffers of the Falkirk & District Charity Football Association.
These matches were often a bigger draw than anything but the Final of the local Charity Cup competitions because of the 'big names' on view. However 'foreign' combinations also visited the district for the benefit of Charity. East Stirlingshire Fc got in touch with Mr Mackay of the Scottish Umpire to put together a fitting team to raise money for the Falkirk Cottage Hospital. After a couple of call-offs finally the two teams met on Wednesday August 31st 1887.
From the Falkirk Herald 3rd September 1887
GLASGOW TEAM v EAST STIRLINGSHIRE
On Wednesday evening the match for the benefit of the proposed Cottage Hospital (postponed from last week) came off on the ground of the East Stirlingshire at Merchiston Park, Bainsford, when there was a large attendance of spectators, who witnessed a hard-contested game. The weather fortunately for a few hours before and during the match was dry , but the rain which had fallen in the fore part of the day had made the ground a trifle greasy. The Glasgow team arrived a man short - Kirkwood of the ground club filling the vacancy, and the Glasgow team was then made up as follows:- Goal, Chalmers (Rangers); backs, Muir (Rangers) and Buchanan (Cambuslang); half-backs, McIntyre (Rangers) and Cameron (Rangers); forwards, left-wing, Brand (Queen of the South Wanderers) and White (Albion Rovers); centre, Kirkwood (East Stirlingshire) and Robertson (Battlefield); right-wing, Suter (Partick Thistle) and Peacock (Rangers). East Stirlingshire were fully represented. "Tuck" McIntyre having lost the toss Glasgow kicked off, but Johnston returned, and after Chalmers had left his charge to return the ball, twice it was sent wide of the goal. The Glasgow left-wing had a run up the field, but the ball was returned, and Reid had a swift run, but sent wide. A chance took place which might have resulted in a goal, but Dunn left the shooting of the ball to Johnston and vice-versa. A corner was obtained off one of the Glasgow backs, and a shot was sent in to Chalmers, which he cleverly cleared. Again Chalmers had to save, and then Sharp was called on to save a drooping shot from the left at the other end. Then Chalmers had a lively time, and the left wing raised the siege, and a from a shot by Kirkwood a corner was conceded by Inch. Nothing resulted from it, and again at the other end Dunn was in front of goal, when the Cambuslang representative rushed in and kicked it out of the field, thus giving a corner. The goal was cleared, but still the East Stirlingshire kept the play mostly in Glasgow ground till the call of half-time, having several corners and several exciting scrimmages. The ball went every place but through the goal, once or twice striking the bar. During this time the Glasgow team were only twice at Sharp's charge, both visits being of brief duration.
Half-time was called without any scoring.
The second half was immediately started, and a run was made for the Glasgow goal, but the ball was returned and the ball was got near mif-field. They were then checked, and Dunn getting the ball sent a shot into goal, which was rushed through two mins from the start. The Glasgow men wrought hard after this, but could not break the home team's defence. About 15 minutes of the second half had gone when a second goal was scored by E.S. By this time darkness had set in, and the play could only be followed with difficulty. No more scoring took place, although once or twice the cry of "goal" arose when the ball was hovering near the Glasgow goal, which was found to be erroneous. The game thus ended East Stirlingshire 2 Glasgow 0.
Athletic Notes
The match in aid of the proposed Cottage Hospital Fund - notwithstanding many adverse circumstances - may be said to have been a great success. The weather on Wednesday last was not so propitious, as the original date fixed on, but I understand upwards of £17 were drawn at the gate. The Glasgow team, too, was not so strong as was affected, but a look over the names shows it to be a pretty good team, and the East Stirlingshire men are to be congratulated on their victory. The match all through was brimful of interest, as was evinced by the interest manifested by the spectators. The second half was not completed as darkness had set in, and the full hour-and-a-half could not be played. Cameron, of the Rangers, was not of much use in the second half, his leg haven given way; while Honeyman, of the home team, was for some time off the field from a kick which he received. I beg to congratulate Mr Reid on carrying out the project to a successful issue, and hope that since the representatives of other clubs left East Stirlingshire to play the game, they will follow suit by playing matches with the same object in view.
Friday, 7 August 2015
The second edition of the Falkirk & District Charity Cup was only slightly better organised than the first, and although they had had all season to prepare, it was not until April that the matches were scheduled (pretty soon May would become the exclusive reserve of Charity Competitions). On the playing side the tournament had expanded to six clubs: Laurieston and Comely Park replacing the defunct Tayavalla.
The kicked off with a bit of a whimper, as although Camelon drubbed the faltering Grahamston by five goals to nil, it was Grahamston who lived to fight another day. Whether through lack of foresight or mere insouciance Camelon fielded two players who had appeared for other clubs in cups that season, and in accordance with the rules of the time were deemed ineligible: Camelon were disqualified and Grahamston progressed.
In the other First Round match Laurieston, the perennial whipping boys of the cup, had their baptism of fire conceding seven to Falkirk. Comely Park by comparison fared surprisingly well in the first of the Semi-Finals again against Falkirk only losing 4-1 (I say surprisingly as Comely Park were virtually Falkirk's nursery team at this point, so really ought have been outmatched in every position).
Grahamston, so 'fortunate' in the first round came up against "The Hammer" of East Stirlingshire in the other Semi-Final, the Zebras scoring their seven goals at will.
Although the Final was the one the organisers wanted in order to maximise the audience, it was by all standards a bit of a non-event. The simple fact being that the best team in Falkirk District defeated the second best by the standard three goals to nil. What is more notable is that this was the last 'important'match at Camelon's old ground at Camelon House: after the closed season Camelon had relocated to Victoria Park, and left that part of their history behind them.
For the second, and last, time the Charity Cup Committee selected a representative XI for a further charity match (NB - it never claimed to select the best XI), this time the opposition were Linlithgowshire.
Wednesday, 30 July 2014
In the aftermath of the Ibrox disaster nearly all of Scottish Football pulled together in aid of the benevolent fund and the Stirlingshire Association did their bit along with the others. A while back I wrote a weepost about the tournament at the start of the 1902/03 season, which was in effect an extra Stirlingshire Cup, the proceeds going to the fund. But before that there was a match played at the tail end of the 1901/02 Season for the same cause.
On Tuesday 15th April 1902 at Merchiston Park [the home of East Stirlingshire FC] the Stirlingshire FA organised two representative teams for a challenge match. Unlike previous matches this was not played by a Stirlingshire XI against a large club or another representative team, instead the sides were chosen along the lines of Town v County, in other words Falkirk against the Rest of Stirlingshire.
Besides the football entertainment was provided by the Carron Works, the Wright Memorial and the Falkirk Burgh Brass Bands, and a there was a "very large attendance of spectators". On the field the Town side wore the Black & White of East Stirlingshire, while County wore Red Jerseys and White shorts.
The match itself was very competitive, although I suppose the tackling was less intense than in a more competitive fixture, and was very end to end. The first side to strike was County, who on the counter attack passed the ball to Baird who hit the leather so hard that Allan could not hold on to to it and let it slip over the line. However within three minutes Town had equalised, scorer missing. For the rest of the half County were on the ascendancy but the Town defence stood form. Half Time 1-1.
Within three minutes of the resumption Town's Centre-Forward Robert Leishman nipped in behind his wee brother William Leishman on the County side to sent Town into the lead. After some exciting goalmouth skirmishes at both ends Baird again put the teams level. But almost straight from the kick-off Dobbie took a long shot that slipped between McCrory's hands and put Town back ahead. For most of the remaining time play was camped in the Town half, but this time William Allan was on the form that was to become common for the next two decades between the sticks. Failing light brought the players off some ten minutes before the scheduled 45 minutes had been played; the result standing Town 3 County 2.
The gate reciepts were reported as £18 6s 1d, but collections made in the ground added to the sum to be given over to the Ibrox Fund.
This is the last time that I have come across a representative Falkirk [geographical] side, but I dare say that were one to compete against the County today an FFC/ESFC XI could have a decent tussle against a SAFC/SFC XI, but I am a hopless romantic and think such matches are the best way to play Benefits, Testimonials & Charity matches, far better than the same two clubs who might have played several times within the last year. I live in hope. |
[Malignant bowel obstruction].
Malignant bowel obstruction (MBO) is a frequent complication in patients with a progressive malignant disorder and represents a major interdisciplinary challenge in palliative care. Gastroenterology plays a pivotal role in the management of MBO. After appropriate diagnostic work-up, it is important to define treatment goals with the patient and his/her relatives, which should focus on symptom relief. Therapeutically, surgical, endoscopic and medical options are available. These will be introduced based on case reports. In the international literature MBO is being more and more considered as a distinct entity. The aim of the present review is to communicate MBO as such in the German medical literature. |
Trains can't dodge, and neither can our planet |
Q:
Moving Sprite in a Circle
I am trying to move a Sprite ("Spaceship") in a circle, where the click was performed.
Here is the code that is triggered when a click is performed:
- (void)newSpaceShipAt: (CGPoint)location
{
SKSpriteNode *hull = [[SKSpriteNode alloc]initWithImageNamed:@"Spaceship"];
CGMutablePathRef path = CGPathCreateMutable();
CGPathAddArc(path, NULL, location.x, location.y, self.size.width / 5.0, 0, 360, YES);
SKAction *move = [SKAction sequence:@[
[SKAction followPath:path duration:1],
]];
[hull runAction:[SKAction repeatActionForever:move]];
hull.name = @"Spaceship";
hull.scale = 0.5;
hull.physicsBody = [SKPhysicsBody bodyWithCircleOfRadius:MAX(hull.size.width / 2.0, hull.size.height / 2.0)];
hull.physicsBody.dynamic = NO;
[self addChild:hull];
}
I was the Spaceship to move in the circle indefinitely about the point "location", which is where the click was performed. However, what happens is that after one successful revolution, the spaceship moves "location" relative from the click. For example, if the click was performed on (50, 100) then after one revolution it will move to (100, 200), relative to the scene, and it will carry on.
What can I do to fix this problem? Or if I my approach is totally wrong, what would be a better one?
Also, what is the best way to draw a trail (a simple line), to the movement of the sprite?
A:
From the documentation of followPath:duration:...
Discussion
Calling this method is equivalent to calling the
followPath:asOffset:orientToPath:duration: method, passing in YES to
both the offset and orient parameters.
The behaviour of this method will tell the hull to orient to the path and also tell it to use the path as an offset. i.e. it will move 50,100 each time it runs.
Use this method instead...
[SKAction followPath:path asOffset:NO orientToPath:YES duration:1.0];
That should solve your problem.
Also, get rid of that sequence.
Do this...
SKAction *moveAction = [SKAction followPath:path asOffset:NO orientToPath:YES duration:1.0];
[hull runAction:[SKAction repeatActionForever:moveAction]];
|
A brief neurocognitive assessment of patients with psychosis following traumatic brain injury (PFTBI): Use of the Repeatable battery for the Assessment of Neuropsychological Status (RBANS).
Patients who develop psychosis following a traumatic brain injury (PFTBI) show impaired neurocognition; however, the degree of impairment has not been empirically investigated using a standardised battery. We administered the Repeatable Battery for the Assessment of Neuropsychological Status (RBANS) to patients with PFTBI (n=10), and to three groups of controls: traumatic brain injury (TBI) (n=10), schizophrenia (n=23), and nonclinical controls (n=23). The results confirmed that the cognitive neuropsychological profile of dually-diagnosed patients with PFTBI is significantly and substantially impaired. Seventy per cent of patients with PFTBI received a neuropsychological classification between the "extremely low" and "low average" ranges. Group-wise analyses on the RBANS indices indicated that patients with PFTBI had the lowest (Immediate Memory, Attention, Delayed Memory, Total Score), or equal lowest (visuospatial, equivalent with schizophrenia patients) scores, with the exception of the Language Index where no group differences were shown (however, the mean PFTBI score on the Language Index was two standard deviations below the RBANS normative score). These findings provide novel evidence of impaired cognitive neuropsychological processing in patients with PFTBI using a standardised and replicable battery. |
Q:
Persisting interfaces using JDO/Datanucleus
I have the following class:
@PersistenceCapable(identityType = IdentityType.APPLICATION, detachable = "true")
public class TclRequest implements Comparable<TclRequest> {
@PrimaryKey
private String id;
@Persistent(types = { DNSTestData.class, POP3TestData.class, PPPoETestData.class, RADIUSTestData.class }, defaultFetchGroup = "true")
@Columns({ @Column(name = "dnstestdata_fk"), @Column(name = "pop3testdata_fk"), @Column(name = "pppoetestdata_fk"), @Column(name = "radiustestdata_fk") })
private TestData testData;
public String getId() {
return id;
}
public TestData getTestData() {
return testData;
}
public void setId(String id) {
this.id = id;
}
public void setTestData(TestData testData) {
this.testData = testData;
}
}
The TestData interface looks like this:
@PersistenceCapable(detachable = "true")
public interface TestData {
@PrimaryKey
public String getId();
public void setId(String id);
}
Which is implemented by many classed including this one:
@PersistenceCapable(detachable = "true")
public class RADIUSTestData implements TestData {
@PrimaryKey
private String id;
private String password;
private String username;
public RADIUSTestData() {
}
public RADIUSTestData(String password, String username) {
super();
this.password = password;
this.username = username;
}
@Override
public String getId() {
return id;
}
@Override
public void setId(String id) {
this.id = id;
}
}
When I try to persiste the TclRequest class, after constructing it of course and using the RADIUSTestData:
//'o' is the constructed TclRequest object.
PersistenceManager pm = null;
Transaction t = null;
try {
pm = getPM();
t = pm.currentTransaction();
t.begin();
pm.makePersistent(o);
t.commit();
} catch (Exception e) {
e.printStackTrace();
if (t != null && t.isActive()) {
t.rollback();
}
} finally {
closePM(pm);
}
The interface field isn't persisted. And the column is not created in the table ! I enabled the debug mode and found 2 catchy things:
1)
-Class com.skycomm.cth.beans.ixload.radius.TestData specified to use "application identity" but no "objectid-class" was specified. Reverting to javax.jdo.identity.StringIdentity
2)
-Performing reachability on PC field "com.skycomm.cth.beans.TclRequest.testData"
-Could not find StateManager for PC object "" at field "com.skycomm.cth.beans.TclRequest.testData" - ignoring for reachability
What could this mean ?
Thanks in advance.
A:
I have figured out how to do it. It's not very much scalable but it works for now.
These are the annotations for the interface member variable. Note that the order of declared types, columns and class names in the extension value is important to be maintaned:
@Persistent(types = { RADIUSTestData.class, POP3TestData.class, PPPoETestData.class, DNSTestData.class }, defaultFetchGroup = "true")
@Columns({ @Column(name = "radiustestdata_fk"), @Column(name = "pop3testdata_fk"), @Column(name = "pppoetestdata_fk"),
@Column(name = "dnstestdata_fk") })
@Extension(vendorName = "datanucleus", key = "implementation-classes", value = "com.skycomm.cth.tcl.beans.radius.RADIUSTestData, com.skycomm.cth.tcl.beans.pop3.POP3TestData, com.skycomm.cth.tcl.beans.pppoe.PPPoETestData, com.skycomm.cth.tcl.beans.dns.DNSTestData")
A sample class implementing one of the interfaces (Just it's "header"):
@PersistenceCapable(detachable = "true")
public class RADIUSTestData implements TestData {
So it's pretty normal here.
|
KY Compact Bill Closer to Becoming Law
The only thing standing in the way of passage of legislation that would allow Kentucky to join an interstate racing compact is reconciliation of bills in the House of Representatives and Senate.
The House passed the bill Feb. 28 by a vote of 80-15. The Senate approved its version of the measure Feb. 9 by a vote of 37-0.
If there is agreement and Democratic Gov. Steve Beshear signs the bill into law, Kentucky would be the first major state to join what is called the National Racing Compact. Six states must pass laws to join before the compact can take effect.
The overall purpose of the compact is to make it easier for the horse racing industry to adopt regulations of interest to all jurisdictions. Each jurisdiction would retain the right not to adopt various rules, however.
The committee substitute passed by the House adds provisions for the Administration Regulations and Review Subcommittee to review any regulations that may be adopted by the national compact. The panel would then have the option to report its findings to the compact.
The House version was sent to the Senate March 1. Only a handful of days remain in this year’s Kentucky General Assembly session.
Should the racing compact bill pass, it will be on the only racing-related legislation to do so. Once again no action was taken on any measures that would address the immediate problems faced by Kentucky’s racing and breeding industry. |
Introduction
============
The kidney undergoes a number of changes in internal structure and function during pregnancy. During normal pregnancy, the placenta and mother produce large amounts of hormones including human chorionic gonadotropin (HCG), human placental lactogen (h-PL), steroid hormones and estrogen ([@b1-etm-0-0-3620]). Such changes in hormone levels can lead to changes in angiotasis and increase water-sodium retention and the volume load, resulting in changes of maternal hemodynamics and kidney structure and function ([@b2-etm-0-0-3620]--[@b6-etm-0-0-3620]). During normal pregnancy, 24-h urine protein and urinary albumin excretion increase significantly after 20 weeks to 200--300 mg and 12--19 mg, respectively. The maximum urinary protein content can reach 500 mg/24 h ([@b7-etm-0-0-3620],[@b8-etm-0-0-3620]).
The random urine albumin-creatinine ratio (ACR) is a reliable method for determining the urine protein-creatinine ratio and monitoring urinary protein excretion. The determination of the urine protein-creatinine ratio can effectively reflect the 24-h urine protein content of pregnant women. It is fast, simple, accurate and has other positive aspects that make it an ideal clinical indicator for the qualitative and quantitative diagnosis of proteinuria and for follow-up. It can replace the traditional 24-h urine protein excretion quantification method ([@b5-etm-0-0-3620]). Clinically, proteinuria is often determined with 24-h urine protein, and normal urinary protein content is generally less than 0.15 g/24 h. However, this method is associated with difficulties such as being greatly influenced by maternal compliance. This is because of the longer urine sample collection time, especially when colleting 24-h urine sample from patients with young children. Therefore, the urine protein-creatinine ratio can be determined immediately to predict the 24 h urine protein content ([@b9-etm-0-0-3620]).
In the present study, random urine ACR was incorporated into evaluation and the perinatal outcomes of women were tracked and observed. Various risk factors affecting gestational hypertension and proteinuria were comprehensively analyzed to identify the risk factors of proteinuria of pregnant women with hypertension.
Patients and methods
====================
### Inclusion and exclusion criteria
The inclusion criteria of the study were: i) Women of childbearing age, \>18; and ii) those with proteinuria during pregnancy. The exclusion criteria for the study were: i) Diabetes before pregnancy and previous history of hypertension; ii) pregnant women with lung infection, urinary system infection or other infections, cancers of the reproductive system or breast cancer; iii) heart, liver, kidney, lung and other organ failure; iv) dying from any diseases; v) abnormal blood clotting mechanism; vi) pregnant women or their families who could not provide cooperation; vii) history of mental illness; viii) not reaching the expected date of confinement or those whose families required terminating the pregnancy.
### Clinical data
A total of 6,758 pregnant women with pregnancy-induced hypertension and proteinuria were randomly selected in the Yantai region from September, 2009 to June, 2011. The average age of participants was 25.3±12.6 years, with mean arterial pressure of 118.5±21.3 mmHg and 24-h urine protein content of 121.7±14.5 mg.
### Data collection
An experienced gynecologist collected the detailed medical history, conducted the physical examination on the participants and recorded their age, gender, height, weight, body mass index (BMI), blood triglyceride, blood low-density lipoprotein cholesterol, blood high-density lipoprotein cholesterol, serum insulin, fasting blood glucose, glycated hemoglobin, aspartate transaminase, γ-glutamyl transpeptidase, creatinine, history of hypertension and history of diabetes.
### Diagnostic criteria
The diagnostic criteria were as follows ([@b5-etm-0-0-3620]): According to the 1999 WHO diagnostic criteria, ≥2 measurements were carried out where systolic blood pressure \>140 mmHg or diastolic blood pressure \>90 mmHg, or antihypertensive medications were being taken.
According to the 1999 WHO-IDF standards published, ≥2 random measurements were carried out where blood glucose \>11.1 mmol/l or fasting glucose \>7.0 mmol/l, there was definitive history of diabetes, or hypoglycemic agents were being taken.
Urine ACR ratio was reliably correlated with 24-h urine protein and the reference value was generally in the range of 0.10--0.20.
First morning urine was completely drained and urine was collected from the second urination. The first urine time was recorded and used as reference for 24 h on the following day. All urine within 24 h was placed in a container and mixed evenly, then 100--200 ml was extracted. The protein content in the healthy urine was generally 40--80 mg. Beyond this range, the diagnosis of proteinuria was made.
Glomerular filtration rate (GFR): The amount of filtered liquid generated from the two kidneys of normal adults was 80--120 ml/min.
Other biochemical indicators were tested with the assistance of the clinical laboratory of Yantaishan Hospital (Shandong, China).
The APGAR score ([@b8-etm-0-0-3620]) included skin color, heart rate, reaction of flicking planta pedis or inserting nasal tube, muscle tension and breathing of the delivered newborn ([Table I](#tI-etm-0-0-3620){ref-type="table"}).
### Statistical analysis
Data were presented as mean ± standard error. The Pearson correlation analysis was performed to investigate associations between various indicators. In addition, multivariate and logistic regression analyses were carried out to identify the variables predictive of APGAR scores. P\<0.05 was consideted to indicate a statistically significant difference.
Results
=======
### General clinical parameters of the enrolled participants
A total of 6,758 pregnant women with combined gestational hypertension and proteinuria diagnosed at the Department of Obstetrics and Gynecology in Yantaishan Hospital from September, 2009 to June, 2011 were randomly selected for the study. Kidney function, blood pressure, history of gravidity and parity, embryo number and birth weight of the enrolled participants were determined. The average age of participants was 25.3±12.6 years, with mean arterial pressure of 118.5±21.3 mmHg and 24-h urine protein content of 121.7±14.5 mg. According to the medical examination information of pregnant women, various indicators were recorded before and after pregnancy and statistical analysis was performed ([Table II](#tII-etm-0-0-3620){ref-type="table"}).
### Pearson correlation analysis between perinatal outcomes and other factors
We recorded and statistically analyzed the APGAR scores of newborns delivered by the participants. According to a literature review, the indicators affecting APGAR score during pregnancy were screened as independent variables and a correlation analysis was performed. The results showed that BMI ([Fig. 1](#f1-etm-0-0-3620){ref-type="fig"}), urinary ACR ([Fig. 2](#f2-etm-0-0-3620){ref-type="fig"}) and GFR ([Fig. 3](#f3-etm-0-0-3620){ref-type="fig"}) of pregnant women were related to the APGAR score and the differences were statistically significant (P\<0.05; [Table III](#tIII-etm-0-0-3620){ref-type="table"}).
### Multivariate and logistic regression analysis on perinatal outcomes and other factors
A logistic regression analysis on all risk factors was performed, and we found that urine ACR and the APGAR score were positively correlated and the correlation coefficient was −0.0951. The difference was statistically significant (P=0.001; [Table IV](#tIV-etm-0-0-3620){ref-type="table"}).
Discussion
==========
Proteinuria during pregnancy severely affects the health of the fetus and mother ([@b2-etm-0-0-3620]). In normal delivery or after termination of pregnancy, these changes may gradually be restored. Under the physiological environment of pregnancy, previous kidney diseases may become worse and severe cases may cause new kidney damage such as acute renal failure ([@b5-etm-0-0-3620],[@b7-etm-0-0-3620],[@b9-etm-0-0-3620]--[@b11-etm-0-0-3620]). From the classification of pregnancy-related kidney diseases, kidney diseases caused by pregnancy do not include pre-eclampsia and eclampsia-induced renal lesions, or diseases occurring before pregnancy such as preeclampsia-associated focal segmental glomerulosclerosis. Some kidney diseases before pregnancy such as focal segmental glomerulosclerosis, IgA nephropathy, membranous nephropathy, reflux nephropathy and even lupus nephritis may be triggered by pregnancy. In addition, hemolytic uremic syndrome and renal cortical necrosis after pregnancy is not uncommon ([@b12-etm-0-0-3620]--[@b16-etm-0-0-3620]). In the present study, the average age of enrolled women was 25.3±12.6 years, with mean arterial pressure of 118.5±21.3 mmHg and 24 h urine protein content of 121.7±14.5 mg. None of the pregnant women had significant hypertension or proteinuria prior to pregnancy.
We determined the indicators associated with proteinuria during pregnancy from the relevant literature and statistically analyzed them in the study participants. The results showed that the BMI, urine ACR and GFR of pregnant woman were associated with the APGAR score and the differences were statistically significant (P\<0.05). The Pearson correlation analysis diagram for BMI and APGAR score was y=2.8035x-3.492, but in multivariate analysis (P\>0.05). During pregnancy, change in weight is highly related to gestational week and fetal weight, although we found there was a linear relationship between weight and the APGAR score. However, there were many confounding factors in the linear relationship, and after the exclusion of these factors, no significant correlation between BMI and APGAR score was found (P\>0.05).
We also analyzed the relationship between GFR and the APGAR score and found that y=−11.929x+135.36 (P\>0.05). According to previous literature, an increase in GFR mainly occured because of increased space between glomerular podocytes, caused by renal lesions. Among women with hypertensive proteinuria, the hypertension-induced glomerular perfusion pressure was significantly increased because membrane filtration permeability was increased. In addition, HCG, h-PL, steroid hormones and estrogen during pregnancy may have increased GFR. Decreased negatively charged salivary proteins on the filtration membrane attenuated the repulsion effect on albumin which was also negatively charged, and proteinuria occurred. However, it was not considered the influencing factor on perinatal outcome.
The determination of urine protein-creatinine ratio can effectively reflect the maternal 24-h urine protein content and excludes the result bias caused by poor compliance and many other factors. In the present study, we found a linear relationship between maternal ACR and APGAR score, y=−0.0951x-0.7623 (P\<0.05), suggesting that proteinuria may affect the fetus in utero, thereby affecting perinatal outcomes. Previous studies showed that if early proteinuria during pregnancy was \>300 mg/24 h, careful clinical attention should be given. These patients were frequently combined with gestational hypertension, leading to reduced fetal survival rate, growth retardation and premature birth ([@b13-etm-0-0-3620],[@b15-etm-0-0-3620],[@b16-etm-0-0-3620]--[@b18-etm-0-0-3620]). Proteinuria during pregnancy can manifest as mild proteinuria, combined proteinuria and hypertension, severe pre-eclampsia, severe eclampsia and other serious obstetric complications that potentially cause hypoxia, acidosis, bleeding, microcirculation, multiple organ failure and other serious complications ([@b19-etm-0-0-3620]--[@b22-etm-0-0-3620]).
In summary, there is an important correlation between perinatal maternal ACR and perinatal outcome. The increase in random urine ACR may predict postpartum outcome. Intervention in early pregnancy or before pregnancy has important clinical significance in reducing adverse complications for infants and mothers such as hypertension in pregnancy and improving the outcome of pregnancy.
{#f1-etm-0-0-3620}
{#f2-etm-0-0-3620}
{#f3-etm-0-0-3620}
######
APGAR score criteria.
Score criteria
----------------------------------------------------------- ---------------- -------------------------------------------------------------- ------------------------
Skin color Purple or pale The body was purplish red and the limbs were blue and purple The whole body was red
Heart rate (beats/min) None \<100 \>100
Reaction of flicking planta pedis or inserting nasal tube No response Some actions were made (such as frowning) Cried and sneezed
Muscle tension Loose Limbs were slightly buckled The limbs moved freely
Breathing None Slow and irregular Normal, cried loudly
######
Summary of baseline clinical data of participants.
Data Age, years HC^[a](#tfn1-etm-0-0-3620){ref-type="table-fn"}^, month SBP, mmHg DBP, mmHg MAP, mmHg BMI^[a](#tfn1-etm-0-0-3620){ref-type="table-fn"}^, (kg/m^2^) AST, U/l ALT, U/l GGT, U/l FPG, mmol/l HbA1C, % TC, mmol/l HDL-C, mmol/l LDL-C, mmol/l GW^[a](#tfn1-etm-0-0-3620){ref-type="table-fn"}^ Urine ACR GFR, (ml/min) Cr, mmol/l
------------------ ------------ --------------------------------------------------------- ------------ ----------- ------------- -------------------------------------------------------------- ------------ ------------ ------------ ------------- ----------- ------------ --------------- --------------- -------------------------------------------------- ----------- --------------- -------------
After pregnancy 24.3±16.4 -- 102.4±27.5 66.8±12.7 87.3±12.6 24.31±1.8 17.83±2.4 13.25±4.2 18.12±1.4 3.25±0.27 4.82±0.13 178.6±22.3 68.4±10.1 98.6±11.3 -- 0.13±0.06 92.8±12.5 58.2±12.7
Perinatal period -- 3.27±3.27 138.5±30.5 82.4±22.8 118.5±21.3 19.7±2.4 17.2±2.1 12.7±3.6 17.6±2.2 4.27±0.85 4.70±0.43 185.4±20.6 67.5±13.5 98.5±10.2 36.4±1.8 0.87±0.23 67.8±24.2 263.7±80.38
T-value -- -- 22.5 21.7 24.8 12.83 0.24 0.22 6.31 0.37 0.82 0.25 0.37 -- 28.9 28.7 23.6
P-value -- -- 0.002 0.002 0.001 0.017 0.79 0.78 0.06 0.62 0.25 0.31 0.66 -- 0.001 0.001 0.001
Related to the gestational week. HC, hypertension course; SBP, systolic blood pressure; DBP, diastolic blood pressure; MAP, mean arterial pressure; BMI, body mass index; AST, aspartate transaminase; ALT, alanine transaminase; GGT, γ-glutamyl transpeptidase; FPG, fasting plasma glucose; HbA1C, hemoglobin A1C; TC, total cholesterol; HDL-C, high-density lipoprotein cholesterol; LDL-C, low-density lipoprotein cholesterol; GW, gestational weeks; ACR, albumin-creatinine ratio; GFR, glomerular filtration rate; Cr, Creatinine.
######
Correlation analysis between the APGAR score and the detection indicators of pregnant women.
Indicator Gender Age SBP, mmHg DBP, mmHg AST, U/l ALT, U/l logGGT, U/l FPG, mmol/l BMI^[a](#tfn2-etm-0-0-3620){ref-type="table-fn"}^, kg/m^2^ HbA1C, % TC, mmol/l HDL-C, mmol/l LDL-C, mmol/l GW^[a](#tfn2-etm-0-0-3620){ref-type="table-fn"}^ Urine ACR GFR, ml/min Cr, mmol/l
----------- -------- -------- ----------- ----------- ---------- ---------- ------------- ------------- ------------------------------------------------------------ ----------- ------------ --------------- --------------- -------------------------------------------------- ----------- ------------- -------------
APGAR 4.70±0.43 185.4±20.6 67.5±13.5 98.5±10.2 36.4±1.8 0.87±0.23 67.8±24.2 263.7±80.38
r 0.02 0.35 0.16 0.28 0.24 0.15 0.06 0.38 2.80 0.37 0.823 0.252 0.371 0.243 −0.095 −11.93 0.164
P-value \>0.05 \>0.05 \>0.05 \>0.05 \>0.05 \>0.05 \>0.05 \>0.05 \<0.05 \>0.05 \>0.05 \>0.05 \>0.05 \>0.05 0.003 0.001 0.365
When full term. SBP, systolic blood pressure; DBP, diastolic blood pressure; AST, aspartate transaminase; GGT, γ-glutamyl transpeptidase; FPG, fasting plasma glucose; BMI, body mass index; HbA1C, hemoglobin A1C; TC, total cholesterol; HDL-C, high-density lipoprotein cholesterol; LDL-C, low-density lipoprotein cholesterol; GW, gestational weeks; ACR, albumin-creatinine ratio; GFR, glomerular filtration rate; Cr, Creatinine.
######
Logistic regression analysis on the newborn APGAR score and influencing factors.
(95% CI)
---------- ---------- ------ ------- ------- ------- ------ ------
GFR 0.581 0.10 0.642 0.652 0.362 0.39 0.78
m-Alb/Cr 0.243 0.01 0.352 0.431 0.001 0.21 0.80
BMI 0.768 0.08 0.871 0.981 0.325 0.61 0.92
CI, confidence interval; GFR, glomerular filtration rate; BMI, body mass index; β, regression coefficient; SE, standard error.
|
IN THE
TENTH COURT OF APPEALS
No. 10-16-00272-CV
WG&D MASONRY, LLC,
Appellant
v.
LONG ISLAND'S FINEST HOMES, LLC,
Appellee
From the 40th District Court
Ellis County, Texas
Trial Court No. 92757
MEMORANDUM OPINION
WG&D Masonry, LLC, a Texas company, sued Long Island’s finest Homes, LLC,
a New York company, in Texas for breach of contract and other causes of action in
connection with two leases of short term rental homes in New York and the subsequent
withholding of the security deposit for the first lease. Long Island filed a special
appearance. After both parties responded multiple times, attaching affidavits and
supporting documents, the trial court held a hearing and granted Long Island’s special
appearance and dismissed WG&D’s lawsuit against Long Island. Because the trial court
did not err in granting the special appearance, we affirm the trial court’s judgment.
FINDINGS OF FACT AND CONCLUSIONS OF LAW
Initially, WG&D complains on appeal that the trial court erred in failing to file
findings of fact and conclusions of law when timely requested and timely notified they
were past due. See TEX. R. CIV. P. 296, 297. As a remedy, WG&D contends we should
either abate the appeal for findings of fact and conclusions of law or reverse the trial
court’s order dismissing WG&D’s lawsuit for lack of personal jurisdiction.
Appeals of orders on special appearances are most commonly brought as appeals
of interlocutory orders, and findings of fact and conclusions of law are not required in
that procedural posture. See TEX. R. APP. P. 28.1(c); TEX. CIV. PRAC. & REM. CODE ANN.
§51.014(a)(7) (West 2014). Notwithstanding that, the order on Long Island’s special
appearance in this case is coupled with a dismissal of WG&D’s claims which makes it a
final judgment. However, WG&D is still not entitled to findings of fact and conclusions
of law. See TEX. R. CIV. P. 296. “The purpose of Rule 296 is to give a party a right to
findings of fact and conclusions of law finally adjudicated after a conventional trial on
the merits before the court.” Ikb Indus. v. Pro-Line Corp., 938 S.W.2d 440, 442 (Tex. 1997).
Where there is no conventional trial on the merits, findings and conclusions may be
proper, but a party is not entitled to them. See id. (findings and conclusions in dismissal
of suit as discovery sanction, helpful but not required). In this case, there was no
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 2
conventional trial on the merits. Thus, WG&D was not entitled to findings of fact and
conclusions of law, and the trial court did not err in not providing them. 1 WG&D’s first
issue is overruled.
SPECIAL APPEARANCE
In its second and third issues, WG&D asserts that because Barry Turk was Long
Island’s agent (second issue) and because Long Island’s contacts through Turk
established personal jurisdiction (third issue), the trial court erred in granting Long
Island’s special appearance.
Pursuant to Rule 120a of the Texas Rules of Civil Procedure, a special appearance
may be made by any party for the purpose of objecting to the jurisdiction of the court
over the person or property of the defendant on the ground that such person or property
is not amenable to process issued by the courts of this State. TEX. R. CIV. P. 120a(1).
Whether a court has jurisdiction is a question of law that we review de novo. Moncrief
Oil Int'l, Inc. v. OAO Gazprom, 414 S.W.3d 142, 150 (Tex. 2013). "When, as here, the trial
court does not issue findings of fact and conclusions of law, we imply all relevant facts
necessary to support the judgment that are supported by evidence." Id.
1 WG&D claims that without findings of fact and conclusions of law, it is left to speculate as to the grounds
of the trial court’s order. In a special appearance, the trial court’s sole determination is whether it has
jurisdiction over a particular party. Further, when the trial court does not issue findings of fact and
conclusions of law, we imply all relevant facts necessary to support the judgment that are supported by
evidence. Moncrief Oil Int'l, Inc. v. OAO Gazprom, 414 S.W.3d 142, 150 (Tex. 2013). Thus, WG&D is still able
to present its appeal without findings of fact and conclusions of law. If the trial court had erred in failing
to file them, any error would be harmless.
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 3
Texas courts have personal jurisdiction over a nonresident defendant when (1) the
Texas long-arm statute provides for it, and (2) the exercise of jurisdiction is consistent
with federal and state due process guarantees. Spir Star AG v. Kimich, 310 S.W.3d 868,
872 (Tex. 2010); Moki Mac River Expeditions v. Drugg, 221 S.W.3d 569, 574 (Tex. 2007). The
Texas long-arm statute's broad doing-business language "allows the statute to reach as
far as the federal constitutional requirements of due process will allow." Retamco
Operating, Inc. v. Republic Drilling Co., 278 S.W.3d 333, 337 (Tex. 2009). Under a
constitutional due-process analysis, personal jurisdiction exists when (1) the non-resident
defendant has established minimum contacts with the forum state, and (2) the assertion
of jurisdiction complies with "traditional notions of fair play and substantial justice."
Moki Mac, 221 S.W.3d at 575 (quoting Int'l Shoe Co. v. Washington, 326 U.S. 310, 316, 66 S.
Ct. 154, 90 L. Ed. 95 (1945)). We focus on the defendant's activities and expectations when
deciding whether it is proper to call the defendant before a Texas court. Int'l Shoe Co.,
326 U.S. at 316.
A defendant's contacts with a forum can give rise to either specific or general
jurisdiction. Am. Type Culture Collection v. Coleman, 83 S.W.3d 801, 806 (Tex. 2002).
WG&D alleges that the trial court had both specific and general jurisdiction. A court has
specific jurisdiction over a defendant if the defendant's alleged liability arises from or is
related to an activity conducted within the forum. Spir Star AG v. Kimich, 310 S.W.3d 868,
873 (Tex. 2010); CSR Ltd. v. Link, 925 S.W.2d 591, 595 (Tex. 1996). In such cases, "we focus
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 4
on the 'relationship among the defendant, the forum[,] and the litigation.'" Spir Star AG,
310 S.W.3d at 873 (quoting Moki Mac, 221 S.W.3d at 575-76). General jurisdiction is
present when a defendant's contacts with a forum are "continuous and systematic," a
more demanding minimum-contacts analysis than specific jurisdiction. Id. at 807. For
general jurisdiction purposes, we do not view each contact in isolation. Am. Type Culture
Collection v. Coleman, 83 S.W.3d 801, 809 (Tex. 2002).
The plaintiff bears "the initial burden of pleading allegations sufficient to confer
jurisdiction," and the burden then shifts to the defendant "to negate all potential bases for
personal jurisdiction the plaintiff pled." Moncrief Oil Int'l, Inc. v. OAO Gazprom, 414
S.W.3d 142, 149 (Tex. 2013). A defendant can negate jurisdiction either legally or
factually. Kelly v. Gen. Interior Constr., Inc., 301 S.W.3d 653, 659 (Tex. 2010). Legally, the
defendant can show that the plaintiff's alleged jurisdictional facts, even if true, do not
meet the personal jurisdiction requirements. See id. Factually, the defendant can present
evidence that negates one or more of the requirements, controverting the plaintiff's
contrary allegations. TV Azteca v. Ruiz, 490 S.W.3d 29, 36 fn. 4 (Tex. 2016). The plaintiff
can then respond with evidence supporting the allegations; and it risks dismissal of its
lawsuit if it cannot present the trial court with evidence establishing personal jurisdiction.
Id. If the plaintiff fails to plead facts bringing the defendant within reach of the long-arm
statute, the defendant need only prove that it does not live in Texas to negate jurisdiction.
Kelly, 301 S.W.3d. at 558-559. If the parties present conflicting evidence that raises a fact
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 5
issue, we will resolve the dispute by upholding the trial court's determination. See
Retamco Operating, Inc. v. Republic Drilling Co., 278 S.W.3d 333, 337 (Tex. 2009); see also
BMC Software Belgium, N.V. v. Marchand, 83 S.W.3d 789, 795 (Tex. 2002).
Agent
We must first decide whether Turk was Long Island’s agent. Because there are no
findings of fact and conclusions of law, the trial court impliedly found Turk was not Long
Island’s agent. To be an agent, a person must (1) act for and on behalf of another person
and (2) be subject to that person's control. Stanford v. Dairy Queen Prods., 623 S.W.2d 797,
801 (Tex. App.—Austin 1981, writ ref'd n.r.e.). Both elements are required; "the absence
of one will prevent the conclusion that an agency relationship exists." Id. An independent
contractor, on the other hand, may act for and in behalf of another; but since he is not
under the other's control, an agency relationship does not exist. Bertrand v. Mut. Motor
Co., 38 S.W.2d 417, 418 (Tex. Civ. App.—Eastland 1931, writ ref’d). Accord Stanford, 623
S.W.2d at 801. Thus, absent proof of control, there is no agency. St. Joseph Hosp. v. Wolff,
94 S.W.3d 513, 542 (Tex. 2002) ("The right of control is the 'supreme test' for whether a
master-servant relationship, rather than an independent contractor relationship, exists.");
Webster v. Lipsey, 787 S.W.2d 631, 635 (Tex. App.—Houston [14th Dist.] 1990, writ denied)
("essential element of proof of agency" is that alleged principal has right to assign agent's
task and to control means and details of process).
WG&D contends that Turk was Long Island’s agent because he was listed on Long
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 6
Island’s website as a member of its “team,” and when Wendy Hernandez, the majority
owner and member-manager of WG&D, contacted Long Island through its website, Turk
replied to her through an email associated with Long Island.2 However, in its amended
special appearance, Long Island asserted by affidavit of Jonas J. Wagner, its president,
that Turk was an independent contractor, not Long Island’s agent. There is no evidence
in the record to show that Long Island had any control over Turk. Long Island’s name
was not on any of the leases entered into by WG&D, payments of rents and security
deposits were not wired to Long Island’s bank account, and Turk admitted he withheld
WG&D’s security deposit, not Long Island. Thus, there is nothing in the record to
establish that Turk was Long Island’s agent. Accordingly, the trial court did not err in
impliedly finding that Turk was not Long Island’s agent, and we overrule WG&D’s
second issue.
Personal Jurisdiction
We now look to whether Long Island, itself, not through the actions of Turk,
purposely availed itself of the privileges of doing business in Texas so as to subject itself
to personal jurisdiction in Texas.
WG&D sued Long Island for breach of contract, bad faith retention of security
deposit, civil theft, conversion, and unjust enrichment/quantum meruit, each stemming
from the same series of transactions allegedly with Long Island. WG&D alleged that
2
The remaining emails from Turk were through an “AOL” address, not Long Island’s address.
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 7
Long Island engaged in the business of offering short-term leases of homes in or around
Long Island, New York to Texas residents and solicited Texas residents, like WG&D to
lease homes in New York. Specifically, WG&D alleged that it entered into a lease
agreement with Long Island for a home in New York which was performed in whole or
in part in Texas; that Long Island negotiated the terms of the lease in Texas via telephone,
electronic mail, and/or fax and presented the final draft of the lease to WG&D by fax for
signature in Texas; and that WG&D wired its security deposit, “realtor fee,” and monthly
rental payments from Texas to Long Island in accordance with the lease. WG&D claimed
that at the conclusion of the lease, Long Island communicated with WG&D via telephone,
electronic mail, and/or fax regarding the return of the security deposit and that Long
Island failed and wrongfully refused to return the deposit.
Long Island filed a special appearance asserting that the trial court did not have
jurisdiction over Long Island because Long Island was not a Texas company, did not
maintain an office or branch in Texas or have any employees in Texas; did not own or
lease any property in Texas, did not solicit business in Texas, did not purposefully direct
its activities toward Texas, was not amendable to process issued by a Texas court, and
has not done any act or consummated any transaction in Texas that would allow the court
to exercise personal jurisdiction over it. It further asserted that any contacts by Long
Island with the State of Texas were random, isolated and fortuitous.
In response, WG&D filed an affidavit of Wendy Hernandez who stated that based
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 8
on the recommendation of a Texas company which had previously leased from Long
Island,3 WG&D called “Barry Turk of Long Island's Finest Homes,” to inquire about
property to rent in New York. Hernandez asserted she received proposed leases from
Turk, ultimately negotiated a lease with Turk, wired money to Long Island, and signed a
lease and faxed it back to Turk. Hernandez attached copies of the leases, the fax cover
sheets, letters from Turk, and the wire transfers. Long Island’s letterhead appears on the
fax cover sheets and letters from Turk which accompanied the leases. The leases
themselves made no mention of Long Island. The wire transfers, appearing to be filled
out by WG&D, indicated that some of the money was sent to a bank account under Turk’s
name and Long Island’s name.
Hernandez also asserted in her affidavit that she and Turk exchanged emails
regarding issues with the rented property, renting different property, wiring more
money, and the return of the security deposit. However, the documents attached to the
affidavit indicate that the emails from Turk originated from an AOL account, not from an
account associated with Long Island. Further the lease signed by WG&D did not include
any letterhead or fax coversheet from Long Island. Also, the wire transfers did not
consistently indicate to whom the money was sent. Some of the wire transfer documents
which used a Chase Bank account ending in “30” indicated the money was sent to Barry
Turk or to Turk and Long Island while some indicated the money was sent to a different
3
No documentation of this transaction was included with the affidavit.
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 9
Chase Bank account number and a different person, Lindon Morrison. Hernandez did
not explain whether or not Morrison had any connection to Long Island.4
WG&D’s response prompted Long Island to file a first amended special
appearance in which Long Island contended neither general nor specific jurisdiction
existed. In support of this contention, Long Island attached the affidavit of Jonas J.
Wagner, Long Island’s president. In his affidavit, Wagner stated Barry Turk was a real
estate broker who occasionally performed work on an independent contract-basis for
Long Island until his contract was terminated on June 5, 2015. He also stated Long Island
was unaware of the contacts between WG&D and Turk until after Long Island was sued
and never authorized Turk to use Long Island’s name, or anything else in connection
with any contract, agreement, communication or document by or between WG&D and
Turk. Wagner confirmed that the email address used in email communications between
Turk and WG&D was not Long Island’s email address.
Wagner further asserted that Long Island never entered into a business
relationship, contract, or agreement with WG&D, never received money from WG&D,
and never solicited business from WG&D in Texas. Wagner confirmed that the bank
account number on the documented wire transfers “has never been” Long Island’s bank
account. He then reasserted that Long Island: 1) never solicited any business in Texas;
2) never conducted business in Texas; 3) had no office in Texas; 4) owned no property in
4
The documents attached to Hernandez’s affidavit indicate Morrison was the landlord for the second lease
signed by WG&D.
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 10
Texas; 5) had no registered agent for service of process in Texas; 6) had no employees in
Texas; 7) never advertised in Texas; 8) did not visit Texas in connection with the lease of
any property to WG&D; and 9) had not visited Texas in connection with the lease of any
other property.
Not to be outdone, WG&D responded to the amended special appearance and
attached another affidavit from Hernandez. In that affidavit, and contrary to her initial
affidavit, Hernandez stated that, based on the recommendation of the company
mentioned in her previous affidavit, Hernandez visited Long Island’s website and visited
the “Meet our Team” page. She attached a copy of that page as it purportedly appeared
in April of 2015. Turk is listed on that page. Hernandez stated that after visiting the page,
she filled out information on a “Contact Us” page on Long Island’s website. Attached to
the affidavit is a copy of that page as it purportedly appeared in April of 2015. Hernandez
asserted that after she filled out the “contact us” information, Turk responded to her
though an email account associated with Long Island. Hernandez responded to Turk at
the same email address. Copies of those emails are attached to the affidavit. A copy of
Turk’s Long Island business card allegedly given to Hernandez by Turk is also attached.
Lastly, Long Island supplemented its first amended special appearance with an
unsworn declaration by Turk. See TEX. CIV. PRAC. & REM. CODE ANN. § 132.001 (West
2011) (“(a) … an unsworn declaration may be used in lieu of a written sworn
declaration…or affidavit….”). Turk stated that Chase Bank account ending in “30” was
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 11
his bank account and was not an account affiliated with Long Island. He also stated that
Suey Tan was the real estate broker and Turk was the real estate agent in connection with
the first lease to WG&D and that Tan and Turk shared the realtor fee in connection with
the lease. Turk affirmed that he held the security deposit for the lease and transferred
the security deposit to another lease by WG&D, but that when WG&D held over on that
second lease, Turk withheld the entire security deposit as damages.
Application
From the evidence described above, the contacts which WG&D asserts establish
the trial court’s jurisdiction over Long Island were either to or from Turk. We have
already held that Turk was not Long Island’s agent. Based on the evidence presented,
Long Island conducted no activity within and had no continuous and systemic contacts
with Texas. Thus, the trial court does not have specific or general jurisdiction over Long
Island. Further, since WG&D failed to plead facts bringing Long Island within reach of
the long-arm statute, to negate jurisdiction, Long Island needed only to prove, and did
so, that it does not “live” in Texas. Accordingly, the trial court did not err in granting
Long Island’s special appearance, and WG&D’s third issue is overruled.
CONCLUSION
Having overruled each issue on appeal, the trial court’s judgment is affirmed.
TOM GRAY
Chief Justice
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 12
Before Chief Justice Gray,
Justice Davis, and
Justice Scoggins
Affirmed
Opinion delivered and filed June 7, 2017
[CV06]
WG&D Masonry, LLC v. Long Island's Finest Homes, LLC Page 13
|
Q:
React - Loop inputs and get sum value
I am attempting to in React JS to get the sum of a group inputs, and put the sum of their total values in a div tag.
I am trying to run this event whenever a user types in any of the inputs
The problem is I am sure React has a proper way to do this!
This is my feeble attempt (please go easy - I am new to coding :)
HTML
<input type="number" id="comp1" name="comp1" onChange={this.handleTotal} />
<input type="number" id="comp2" name="comp2" onChange={this.handleTotal} />
<input type="number" id="comp3" name="comp3" onChange={this.handleTotal} />
<input type="number" id="comp4" name="comp4" onChange={this.handleTotal} />
<input type="number" id="comp5" name="comp5" onChange={this.handleTotal} />
<input type="number" id="comp6" name="comp6" onChange={this.handleTotal} />
<div id=total></div>
JS
handleTotal = e => {
// Grab all inputs that start with ID 'comp'
let inputs = document.querySelectorAll('[id^="comp"]');
// Trying to loop through the values and get the sum of all inputs
for (var i = 0; i < inputs.length; i++) {
let totalVal = inputs[i].value
console.log(totalVal);
}
//Trying to grab total values of all inputs and put in element
document.getElementById('total').innerHTML = totalVal;
}
A:
At the moment you are not utilizing any of the React's data binding.
Best to use React's state to hold the values of the total and all the comp inputs.
I've also used the .reduce method in order to calculate the total for each of the input fields' values. But you can achieve the same thing with a for loop.
JSFiddle: Alternative "calculateTotal" function with for loop
More information on Input handling in React
class App extends React.Component {
constructor() {
super();
this.state = {
total: 0,
numbers: {
comp1: 1,
comp2: 0,
comp3: 4,
comp4: 0,
comp5: 0,
comp6: 0
}
};
}
componentDidMount() {
// Calculates the total after component is mounted
this.setState({ total: this.calculateTotal(this.state.numbers) });
}
calculateTotal = (numbers) => {
return Object.entries(numbers).reduce((finalValue, [key, value]) => {
if (value === "") {
// if entered value is empty string "", omits it
return finalValue;
}
return finalValue + value;
}, 0);
}
handleTotal = (e) => {
const { value, name } = e.target; // gets the name and value from input field
const parsedValue = value === "" ? "" : parseFloat(value); // parses the value as a number or if empty treats it as empty string ""
this.setState((prevState) => {
// creates new immutable numbers object, using previous number values and the currently changed input value
const updatedNumbers = {
...prevState.numbers,
[name]: parsedValue
// https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Object_initializer#Computed_property_names
};
// calculates the new total from updated numbers:
const newTotal = this.calculateTotal(updatedNumbers);
return {
numbers: updatedNumbers,
total: newTotal
}
})
}
render() {
return (
<div>
<input type="number" name="comp1" onChange={this.handleTotal} value={this.state.numbers.comp1} />
<input type="number" name="comp2" onChange={this.handleTotal} value={this.state.numbers.comp2}/>
<input type="number" name="comp3" onChange={this.handleTotal} value={this.state.numbers.comp3}/>
<input type="number" name="comp4" onChange={this.handleTotal} value={this.state.numbers.comp4}/>
<input type="number" name="comp5" onChange={this.handleTotal} value={this.state.numbers.comp5}/>
<input type="number" name="comp6" onChange={this.handleTotal} value={this.state.numbers.comp6}/>
<div id="total">{this.state.total}</div>
</div>
);
}
}
ReactDOM.render(<App />, document.getElementById('root'));
<script src="https://cdnjs.cloudflare.com/ajax/libs/react/16.6.3/umd/react.production.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/react-dom/16.6.3/umd/react-dom.production.min.js"></script>
<div id="root"></div>
|
*n**2 + 24*n - 498
What is the third derivative of -2113*d**3*f**2 + d**2*f**2 - 29*d**2*f + 2*f**2 wrt d?
-12678*f**2
What is the third derivative of 49*u**4*v**2 + u**4*v - 2*u**3 - 2*u**2*v**2 + 2*u**2*v + 21*v**2 wrt u?
1176*u*v**2 + 24*u*v - 12
Find the first derivative of 44*d*k**3 + d*k + 5*d*q**3 + 8*k**3*q wrt q.
15*d*q**2 + 8*k**3
What is the second derivative of -8*q**4 - 42*q**3 + 4*q - 334 wrt q?
-96*q**2 - 252*q
Find the second derivative of 8*p**2*x**2 + 5*p**2*x + 4*p*x**2 - 23*p wrt p.
16*x**2 + 10*x
Differentiate 171*k - 170.
171
Find the third derivative of -7511*n**3 - n**2 + 15 wrt n.
-45066
Find the second derivative of -2271*a**2 - 6*a - 3.
-4542
Find the third derivative of -127*r**4 - 32*r**2.
-3048*r
What is the first derivative of 29*f**3 - 51*f**2*q**2 - 17*q**2 + 15*q - 2 wrt f?
87*f**2 - 102*f*q**2
Find the second derivative of -b**4*u + b**4 + 29*b**3 + 46*b*u + 4*b wrt b.
-12*b**2*u + 12*b**2 + 174*b
Find the first derivative of -1603*d**2 - 276 wrt d.
-3206*d
Differentiate -164*x**4 + 51 wrt x.
-656*x**3
Find the third derivative of 335*f**3*h**3*w - 4*f**3*h**2*w**3 - 2*f**2*h**3*w**3 + 3*f**2*h**3*w + 3*f**2 + 38*h**2*w**3 wrt f.
2010*h**3*w - 24*h**2*w**3
What is the third derivative of -420*d**4 + 60*d**2 + 3*d wrt d?
-10080*d
Find the second derivative of 1562*s**2 - s - 3435.
3124
Find the second derivative of 2*f**3*j - 3328*f**2*j - 2*f*j + f - 3*j - 1 wrt f.
12*f*j - 6656*j
Find the first derivative of 5891*v*y**2 - v*y + 16*y**2 + 6*y + 6 wrt v.
5891*y**2 - y
Find the first derivative of -3745*l + 2919 wrt l.
-3745
What is the derivative of -8501*s**4 - 4542?
-34004*s**3
Differentiate 3*u**2*w - 2*u**2 + 2*u*w + 488*w wrt u.
6*u*w - 4*u + 2*w
What is the second derivative of -45*u**3*z - 2*u**2*z**3 + 4*u*z**3 - 2*u wrt u?
-270*u*z - 4*z**3
What is the third derivative of -1233*w**6 + 1668*w**2 - w?
-147960*w**3
What is the third derivative of -4068*f**5 - 5*f**2 + 503*f?
-244080*f**2
Find the third derivative of 1176*z**5 + 2*z**2 + 3096*z wrt z.
70560*z**2
What is the second derivative of 2*b**2*f**2*w + 3*b**2*f*w - b**2*w**3 - 15*b**2 - 606*f**2*w**3 + 4*f**2 wrt w?
-6*b**2*w - 3636*f**2*w
Find the third derivative of 2*u**3*w**3 + 26*u**3*w + 2*u**2*w + 8*u - 14*w**3 wrt u.
12*w**3 + 156*w
Differentiate 13*n*p - 56*n - 2507*p wrt n.
13*p - 56
Differentiate 2*m**3*s - m**3 + 936*m**2*s - 6*m with respect to s.
2*m**3 + 936*m**2
What is the third derivative of 167*z**3 + 205*z**2 + 2*z?
1002
Differentiate -250*t**2 + 2838 with respect to t.
-500*t
Find the third derivative of -m**5 - 3333*m**4 + 4957*m**2.
-60*m**2 - 79992*m
Find the second derivative of -815*a**3 - 2*a**2 + 2*a + 4 wrt a.
-4890*a - 4
What is the third derivative of -5*z**6 + 182*z**3 + 1230*z**2 + 5 wrt z?
-600*z**3 + 1092
What is the derivative of -58*a*o**4 - a*o**2 + 700*a - 4*o**2 wrt o?
-232*a*o**3 - 2*a*o - 8*o
Find the third derivative of 3*g**4*o*t + 10*g**4*t + 115*g**3*o**2 + 3*g**2*o*t - 6*g**2*o - g*o**2*t wrt g.
72*g*o*t + 240*g*t + 690*o**2
What is the derivative of 319*r*t**2 - 23*r - 2 wrt t?
638*r*t
Find the third derivative of -2*k*o**4 - 2*k*o**3*q - 49*k*o**3 - 41*k*o**2 - 2*o**2 - 2*q wrt o.
-48*k*o - 12*k*q - 294*k
Find the third derivative of -43*g*r**5 + g*r**2 + 44*g*r - 18*r**6 wrt r.
-2580*g*r**2 - 2160*r**3
What is the second derivative of 1281*t**2 + 3282*t wrt t?
2562
Find the second derivative of -17*m**5*v - 7*m**2*v - 2*m*v + 90*m wrt m.
-340*m**3*v - 14*v
Find the first derivative of -6*k**3*m*y + 24*k**3*y - 2*k**2*y**3 - k*m*y**3 + 2*y**2 wrt m.
-6*k**3*y - k*y**3
What is the second derivative of 26985*a*y**2 + 2*a*y + a + 41*y + 2 wrt y?
53970*a
Find the third derivative of 2*i**5*o**2 + 239*i**5 - 31*i**2*o**2 - 5*i**2 wrt i.
120*i**2*o**2 + 14340*i**2
What is the third derivative of 94*t**3 - 3*t**2 + 3*t?
564
Find the second derivative of -2*a**5*b + 28*a**5 - 10*a*b + 12*a wrt a.
-40*a**3*b + 560*a**3
What is the second derivative of 4*f**3 - 30*f**2 + 646*f wrt f?
24*f - 60
Find the first derivative of -233*h**3 - 1701.
-699*h**2
Find the first derivative of -1376*n + 2859.
-1376
Find the third derivative of 200*h**4 + h**3 + 14*h**2 + 18*h wrt h.
4800*h + 6
Find the second derivative of -2*p*t**3 + 54*p*t**2 - 427*p*t*z + 2*p*t - 6*t**2*z + 3*t*z + z wrt t.
-12*p*t + 108*p - 12*z
What is the derivative of -29*d**4 - d**3 + 210?
-116*d**3 - 3*d**2
Find the second derivative of 2*z**4 - 188*z**3 + z + 7081 wrt z.
24*z**2 - 1128*z
Find the second derivative of 26*g**3*l**2*n**2 - 11*g**3*l*n**3 - 3*g**3*l*n + 69*g*l**2*n**3 + 2*l*n**2 wrt l.
52*g**3*n**2 + 138*g*n**3
What is the derivative of 2*a**3*r**2 - 65*a**3*r + 8403*a**3 - 4*r wrt r?
4*a**3*r - 65*a**3 - 4
What is the second derivative of -12*g**4 - 8*g**3 + 17*g + 10?
-144*g**2 - 48*g
Differentiate 128*w - 135.
128
What is the third derivative of -350*w**3 + w**2 - 125*w?
-2100
What is the second derivative of 1160*x**5 - 1777*x wrt x?
23200*x**3
Find the third derivative of 425*p**3 + 132*p**2 wrt p.
2550
Find the second derivative of -1912*x**2 - 2060*x.
-3824
Find the second derivative of -6127*l**3 - 5839*l wrt l.
-36762*l
What is the first derivative of -7*o**3*t**3 - o**3*t**2 + 177*t**3 wrt o?
-21*o**2*t**3 - 3*o**2*t**2
What is the second derivative of 8*i*r**3*x - 3*i*r**3 - 6*i*r*x - 8*i*x + 16*r**3*x - 2*r wrt r?
48*i*r*x - 18*i*r + 96*r*x
Find the third derivative of 3*a**3*u**5 - 14*a**3*u**2 + 40*a*u**5 + a*u**2 wrt u.
180*a**3*u**2 + 2400*a*u**2
Find the second derivative of -11651*w**2 - 14823*w wrt w.
-23302
Find the second derivative of d**2*k**2 - 118*d**2*k - 2*d**2 + 17*k**3 - 2*k**2 + 2 wrt k.
2*d**2 + 102*k - 4
Find the second derivative of -225*h**3*x**3 + 18*h**3 - 5*h**2*x + 2*x**4 wrt x.
-1350*h**3*x + 24*x**2
Find the first derivative of -1201*a**3*j - 97*a**3 + 2*a**2 wrt j.
-1201*a**3
What is the second derivative of -j**2*q**2 - 95*j**2*q*r + j**2*r + 821*j*q**2*r**2 - 2*j*q - 2*r**2 wrt q?
-2*j**2 + 1642*j*r**2
What is the third derivative of -3*m**2*w**3 - 18*m**2*w**2 - 2*m**2*w - m*w**5 + 2*m*w**2 - 4*w**4 wrt w?
-18*m**2 - 60*m*w**2 - 96*w
Find the first derivative of 316*d + 2078.
316
Find the first derivative of -6*i**4 + 159*i**3 - 8431.
-24*i**3 + 477*i**2
What is the derivative of 289*d**3*q - 2*d**3 + 22 wrt q?
289*d**3
What is the third derivative of 317*y**3*z**2 - 11*y**3 + 3*y**2*z**2 + 118*y**2 - 3*z + 2 wrt y?
1902*z**2 - 66
What is the first derivative of -8*m**3*p - 47*m**2*p - 3*m + p - 510 wrt m?
-24*m**2*p - 94*m*p - 3
What is the second derivative of -4*i**5 + 3*i**4 - 13*i**3*n - 2*i*n - i - n + 116 wrt i?
-80*i**3 + 36*i**2 - 78*i*n
Find the first derivative of -3*o*x + o + 11*x + 14 wrt x.
-3*o + 11
What is the third derivative of -243*c**4 - 3*c**2 - 10*c?
-5832*c
What is the third derivative of 95*f**5 + f**4*m + f**3*m**2 + 5*f**2*m**2 - 156*f**2*m wrt f?
5700*f**2 + 24*f*m + 6*m**2
What is the first derivative of 185*j + 77 wrt j?
185
Find the first derivative of -10*r**2*v*z + 16*r**2*v - 2*r**2*z + 3*v*z + 1 wrt z.
-10*r**2*v - 2*r**2 + 3*v
Differentiate -60*f*q*y**2 + 3*f*q*y - f*y + q*y**3 + 163*y**3 with respect to q.
-60*f*y**2 + 3*f*y + y**3
Find the first derivative of -16*v**4 + 4*v**3 - 170 wrt v.
-64*v**3 + 12*v**2
Find the first derivative of 208*s**3*z**4 + 39*s**3 - s*z**4 + 1 wrt z.
832*s**3*z**3 - 4*s*z**3
What is the second derivative of -2*b**3*i**2 + 4*b**3*i*w**2 - b**3 + 31*b**2*i**2*w**2 - b**2*w - 341*w wrt w?
8*b**3*i + 62*b**2*i**2
Find the second derivative of 105*v**2 - 99*v.
210
Find the second derivative of -12*b**3 + 15*b**2 + 367*b wrt b.
-72*b + 30
Differentiate 3*k**2*o**2 - 570*k**2 - 38*o**4 wrt o.
6*k**2*o - 152*o**3
What is the third derivative of 3*b**4*v**3 - 8*b**4*v + 3*b**4 - 44*b**2*v**3 - b**2*v**2 wrt b?
72*b*v**3 - 192*b*v + 72*b
What is the second derivative of -372*p**4*y**3 - 2*p - 94*y**3 wrt p?
-4464*p**2*y**3
Find the third derivative of 3*l**5 - 7*l**3*o**2 - 7*l**2*o**2 - 3*o**2 wrt l.
180*l**2 - 42*o**2
What is the derivative of 2*c*f*m + 5*c*m + 20*c - f + 253*m wrt c?
2*f*m + 5*m + 20
What is the third derivative of -c*v**4 + 3*c*v**3 - 2*c + 58*v**4 + 4*v**3 + 571*v**2 wrt v?
-24*c*v + 18*c + 1392*v + 24
Differe |
Q:
Java software: disable after a specific date
I'm developing a simple software for a professor of mine. Nothing special, it just takes some data from some sites and merge them into a text file that will be analyzed from an R program.
Anyway, he asked me a "particularity": this software will be used by his students but he wants for it to be useless after this weeks of lessons. How can I achieve that? They are not computer science students, so something "simple" should be fine, but anyway I need some suggestions. I was thinking to create a web service, but I'm hoping for something else. I've searched and I could not find something useful for me.
A:
I had done this for one of my projects.
Created a file on S3 with restricted access.
Every time the app is executed, i request for this file.
If it exists, i allow them to use the app else System.exit(1).
In your case, you can use this strategy with one file containing the end date, being the date of last class.
Fetch current date time from some public API.
Everytime the app is launched, fetch this file from S3, parse the end date and check for expiry.
Drawback: In case of No internet, the app will not be usable.
|
---
abstract: 'Identifying and ameliorating dominant sources of decoherence are important steps in understanding and improving quantum systems. Here we show that the free induction decay time ($T_{2}^{*}$) and the Rabi decay rate ($\Gamma_{\mathrm{Rabi}}$) of the quantum dot hybrid qubit can be increased by more than an order of magnitude by appropriate tuning of the qubit parameters and operating points. By operating in the spin-like regime of this qubit, and choosing parameters that increase the qubit’s resilience to charge noise (which we show is presently the limiting noise source for this qubit), we achieve a Ramsey decay time $T_{2}^{*}$ of and a Rabi decay time $1/\Gamma_{\mathrm{Rabi}}$ exceeding $1~\mathrm{\mu s}$. We find that the slowest $\Gamma_{\mathrm{Rabi}}$ is limited by fluctuations in the Rabi frequency induced by charge noise and not by fluctuations in the qubit energy itself.'
author:
- Brandur Thorgrimsson
- Dohun Kim
- 'Yuan-Chi Yang'
- 'L. W. Smith'
- 'C. B. Simmons'
- 'Daniel R. Ward'
- 'Ryan H. Foote'
- 'J. Corrigan'
- 'D. E. Savage'
- 'M. G. Lagally'
- Mark Friesen
- 'S. N. Coppersmith'
- 'M. A. Eriksson'
title: ' **Extending the coherence of a quantum dot hybrid qubit**'
---
[^1]
Introduction {#introduction .unnumbered}
============
There has been much progress in the development of qubits in semiconductor quantum dots [@Loss:1998p120], making use of one [@Koppens:2006p766; @Simmons:2011p156804; @Pla:2012p489; @Veldhorst:2014p981; @Kawakami:2014p666; @Yoneda:2014p267601; @Veldhorst:2015p410; @Scarlino:2015p106802; @House2016:p044016; @Takeda:2016p1600694], two [@Levy:2002p1446; @Petta:2005p2180; @Foletti:2009p903; @Petersson:2010p246804; @Maune:2012p344; @Wang:2013p046801; @Shi:2013p075416; @Wu:2014p11938; @HarveyCollard:2015preprint], and three quantum dots [@DiVincenzo:2000p1642; @Laird:2010p1985; @Gaudreau:2011p54; @Medford:2013p654; @Eng:2015p1500214; @Russ:2015p235411] to host qubits. Charge noise is often the leading source of decoherence in semiconductor qubits [@Dial:2013p146804], and an advantage of using two or more quantum dots to host a single qubit is the ability to work at sweet spots, a technique pioneered in superconducting qubits [@Vion:2002p886], that make the qubit more resistant to charge noise .
In this work we focus on one such qubit, the quantum dot hybrid qubit (QDHQ) [@Shi:2012p140503; @Koh:2013p19695; @Kim:2014p70; @Ferraro:2014p1155; @Mehl:2015preprint; @DeMichielis:2015p065304; @Cao:2016p086801; @Wong:2016p035409; @Chen:2017p035408], which is formed from three electrons in a double quantum dot, and can be viewed as a hybrid of a spin qubit and a charge qubit. Fast, full electrical control of the QDHQ was recently implemented experimentally using ac gating [@Kim:2015p15004], demonstrating a free induction decay (FID) time of 11 ns through operation in the spin-like operating region (see Fig. 1). While QDHQ gating times are fast, substantial further improvements in QDHQ coherence times are required to achieve the high-fidelity gating necessary for fault-tolerant operation [@Fowler:2012p032324]. True sweet spots, which are used to increase resistance to noise and thus increase coherence, are defined by a zero derivative of the qubit energy with respect to a parameter subject to noise. Sweet spots are usually found at specific points of zero extent in parameter space, so that non-infinitesimal noise amplitude temporarily moves a qubit off the sweet spot. The spin-like regime of the QDHQ has no true sweet spot; however, it has a large and extended region of small $dE_Q/d\varepsilon$, where $E_Q$ is the qubit energy and $\varepsilon$ is the detuning between the two quantum dots.
Here we show that the spin-like operating regime for the QDHQ can be made resilient to charge noise by appropriate tuning of the internal parameters of the qubit. By measuring $dE_Q/d\varepsilon$, we are able to identify dot tuning parameters that increase resiliency to charge noise. These measurements show that the three-electron QDHQ can be tuned *in-situ* in ways that have a predictable and understandable impact on the qubit coherence: the qubit dispersion can be tuned smoothly by varying device gate voltages, and we find that the dephasing rate is proportional to $dE_Q/d\varepsilon$, consistent with a charge noise dephasing mechanism. Reducing $dE_Q/d\varepsilon$ significantly enhances the coherence of the qubit. We have achieved an increase the coherence times by more than an order of magnitude over previous work, decreasing the Rabi decay rate $\Gamma_\mathrm{Rabi}$ from 67.1 MHz to 0.98 MHz, and increasing the FID time $T_2^*$ to as long as . These parameters correspond to an infidelity contribution from pure dephasing of about 1%.
Results {#results .unnumbered}
=======
Fig. 1 shows the energy levels of the QDHQ as a function of the detuning $\varepsilon$. At negative detuning the energy difference between the ${\ensuremath{|{0}\rangle}}$ and ${\ensuremath{|{1}\rangle}}$ states is dominated by the Coulomb energy, while at large positive detunings, where both logical states have the same electron configuration (one electron on the left and two on the right), the energy difference is dominated by the single-particle splitting $E_{\mathrm{R}}$ between the lowest two valley-orbit states in the right dot. Here the logical states are described by their spin configuration: ${\ensuremath{|{0}\rangle}}={\ensuremath{|{\downarrow}\rangle}}{\ensuremath{|{S}\rangle}}$ and ${\ensuremath{|{1}\rangle}}=\sqrt{1/3}{\ensuremath{|{\downarrow}\rangle}}{\ensuremath{|{T_{0}}\rangle}}-\sqrt{2/3}{\ensuremath{|{\uparrow}\rangle}}{\ensuremath{|{T_{-}}\rangle}}$, where ${\ensuremath{|{\downarrow}\rangle}}$ and ${\ensuremath{|{\uparrow}\rangle}}$ represent the spin configuration of the single electron in the left quantum dot and ${\ensuremath{|{S}\rangle}}$, ${\ensuremath{|{T_{0}}\rangle}}$, and ${\ensuremath{|{T_{-}}\rangle}}$ represent the singlet (S) and triplet ($\mathrm{T}_{0},~\mathrm{T}_{-}$) spin configurations of the two electrons in the right quantum dot. The tunnel coupling $\Delta_{1(2)}$ describes the anticrossings between the right dot ground (first excited) state and left dot ground state.
{width="50.00000%"}
shows results of FID measurements for four different values of the measured $dE_Q/d\varepsilon$, performed using the pulse sequence of diagram IV of Fig. 1, in order to determine $\Gamma_{2}^{*}=1/T_2^*$. For short times , Ramsey fringes are visible for all $dE_Q/d\varepsilon$; in contrast, for $t_\mathrm{Free}=22~\mathrm{ns}$, Ramsey fringes are attenuated in Fig. 2b (large $dE_\text{Q}/d\varepsilon$), yet are still clearly visible in Fig. 2f (small $dE_\text{Q}/d\varepsilon$). As shown in Fig. 2, by tuning the qubit to achieve $dE_Q/d\varepsilon = 0.0025$, Ramsey fringes are still visible at $t_\mathrm{Free}=120$ ns, and at this tuning . Fits to the Ramsey fringe amplitude detunings are shown in Fig. 2i, strong correlation between small $dE_{\mathrm{Q}}/d\varepsilon$ and long $T_2^*$.
![ **Changing the dot tuning and $\varepsilon$ to achieve small $dE_{\mathrm{Q}}/d\varepsilon$ decreases the free induction decay (FID) rate by more than an order of magnitude.** **a-** Plots showing the probability $P_1$ of being in state ${\ensuremath{|{1}\rangle}}$ after applying the Ramsey pulse sequence of diagram IV in Fig. 1, for qubit tunings characterized by different $dE_{\mathrm{Q}}/d\varepsilon$ values. Two $t_\text{Free}$ time windows are shown for , corresponding to $dE_{\mathrm{Q}}/d\varepsilon$=$0.028$ (**a,b**), $dE_{\mathrm{Q}}/d\varepsilon$=$0.012$ (**c,d**), $dE_{\mathrm{Q}}/d\varepsilon$=$0.0042$ (**e,f**), and $dE_{\mathrm{Q}}/d\varepsilon$=$0.0025$ (**g**). Comparing **b**, **d**, **f**, and , we see that the FID rate decreases as $dE_{\mathrm{Q}}/d\varepsilon$ decreases. **, i**, Oscillation amplitudes as a function of $t_\text{Free}$, normalized by their value at ${t}_{\mathrm{Free}} = 0$ are obtained at the $\varepsilon$ values indicated by black arrows in . **j**, $\Gamma_{2}^{*}$ vs. $dE_{\mathrm{Q}}/d\varepsilon$, obtained , as in **i** , for several different tunings and a range of $\varepsilon$. The data are well fit to Eq. (\[GammaEQ\]) (blue line, ), providing evidence that $\Gamma_{2}^{*}$ is limited by charge noise. ](Figure_2.pdf){width="50.00000%"}
Fig. 2j shows $\Gamma_2^* = 1/T_{2}^{*}$ for a wide range of $dE_{\mathrm{Q}}/d\varepsilon$, . For a gaussian distribution of quasistatic fluctuations of the detuning parameter, with a standard deviation of $\sigma_\varepsilon$, one expects that [@Petersson:2010p246804; @Dial:2013p146804] $$\Gamma_{2}^{*} = \rvert dE_{\mathrm{Q}}/d\varepsilon \lvert \sigma_{\varepsilon} / \sqrt{2}\hbar .
\label{GammaEQ}$$ In Fig. 2j, we observe such a linear relation between $\Gamma_2^*$ and $dE_\text{Q}/d\varepsilon$, with fitting constant
{width="100.00000%"}
We now turn to a discussion of the Rabi decay time, $1/\Gamma_{\mathrm{Rabi}}$, and its dependence on the qubit dispersion $dE_{\mathrm{Q}}/d\varepsilon$. Fig. 3a shows both $E_{\mathrm{Q}}$ and $dE_{\mathrm{Q}}/d\varepsilon$ as a function of detuning, calculated using the measured tuning parameters for Figs. 3b-e (see Supplementary Section 1 and 4), showing the decrease in the slope $dE_{\mathrm{Q}}/d\varepsilon$ with increasing $\varepsilon$. Figs. 3b-e show Rabi oscillation measurements, performed with a microwave burst of duration $t_{\mathrm{RF}}$ and acquired at the detunings labeled b-e in Fig. 3a, showing that with increasing $\varepsilon$ (and therefore decreasing $dE_{\mathrm{Q}}/d\varepsilon$) the Rabi decay rate $\Gamma_{\mathrm{Rabi}}$ decreases by more than an order of magnitude for the data reported here.
For quantum gates, the contribution to infidelity arising from qubit decoherence is minimized when the ratio of the gate duration to the Rabi decay time is minimized. The data in Fig. 3f, acquired at a different dot tuning, shows that this ratio can be made small enough that an $X_{\pi/2}$ gate can be performed over 100 times within one Rabi decay time. In the absence of any other nonideality in the experiment, this would limit the fidelity of an $X_{\pi/2}$ rotation on the Bloch sphere to $99.0\%$ and would represent a sevenfold improvement over previous results [@Kim:2015p15004].
It is also interesting to consider how long the Rabi decay time, $1/\Gamma_\mathrm{Rabi}$, itself can be. Fig. 3g shows Rabi oscillations acquired at a different dot tuning and a very small $dE_{\mathrm{Q}}/d\varepsilon = 0.005$. Here, $\Gamma_{\mathrm{Rabi}} = 0.98~\mathrm{MHz}$, representing a decrease by more than a factor of 30 from previously reported Rabi decay rates [@Kim:2015p15004].
The decay of Rabi oscillations is caused by at least two different mechanisms [@Yan:2013p2337], both of which are observed in these experiments. First, for relatively large values of $dE_{\mathrm{Q}}/d\varepsilon$, fluctuations in $E_{\mathrm{Q}}$ from charge noise dominate the decoherence. This is similar to FID measurements, with the important difference that the microwave drive effectively reduces the range of frequencies decohering the qubit. This results in Rabi decoherence rates $\Gamma_{\mathrm{Rabi}}$ that are slower than the FID rates $\Gamma_{2}^{*}$ at the same $dE_{\mathrm{Q}}/d\varepsilon$. For this mechanism, the Rabi decay is expected to be exponential and depend quadratically on $dE_{\mathrm{Q}}/d\varepsilon$ [@Jing:2014p022118; @Ithier:2005p134519]. Fig. 3h shows $\Gamma_{\mathrm{Rabi}}$ vs. $dE_{\mathrm{Q}}/d\varepsilon$ and a quadratic fit to the data; the data are well-described by this functional form, and decreasing $dE_{\mathrm{Q}}/d\varepsilon$ yields nearly two orders of magnitude decrease in $\Gamma_{\mathrm{Rabi}}$.
Second, charge noise can also cause fluctuations in the rotation rate $f_{\mathrm{Rabi}}$ itself [@Yan:2013p2337], and as $dE_{\mathrm{Q}}/d\varepsilon$ becomes small, these fluctuations become the dominant source of decoherence. This second decay process is expected to yield a decay rate proportional to the drive amplitude $A_{\varepsilon}$, and as shown in Fig. 3i, we observe this proportionality in the experiment for small $dE_{\mathrm{Q}}/d\varepsilon$. Thus, for small $dE_{\mathrm{Q}}/d\varepsilon$, fluctuations in $f_{\mathrm{Rabi}}$ dominate the Rabi decay rate. In contrast to the Rabi decay process discussed above, in which the applied microwave pulse narrows the frequency range of charge fluctuations contributing to the decay, charge fluctuations over a wide bandwidth are expected to contribute to this decay process. This contribution can be seen by applying the rotating wave approximation to Eq. (S1) in Supplementary Section 1, which yields an approximate form for $f_{\mathrm{Rabi}}$ that is valid at large detunings: $$f_{\mathrm{Rabi}} = \frac{\Delta_{1}\Delta_{2}}{2h\varepsilon(\varepsilon-E_{\mathrm{R}})}A_{\varepsilon}.
\label{frabiEQ}$$ $\sigma_{\varepsilon}$ can then be related to $\sigma_{\mathrm{Rabi}}$, the standard deviation of fluctuations in $f_{\mathrm{Rabi}}$, by $$\sigma_{\mathrm{Rabi}} = (df_{\mathrm{Rabi}}/d\varepsilon)\sigma_{\varepsilon}.$$ We therefore expect the decay rate from this mechanism to be proportional to $dE_{\mathrm{Q}}/d\varepsilon$ rather than to the square of $dE_{\mathrm{Q}}/d\varepsilon$, explaining its dominance at small $dE_{\mathrm{Q}}/d\varepsilon$.
Discussion {#discussion .unnumbered}
==========
In this work we have shown that the internal parameters of the QDHQ can alter the qubit dispersion $dE_{\mathrm{Q}}/d\varepsilon$ over a wide range, resulting in large tunability in both the decoherence rates and the Rabi frequencies achievable. The dominant dephasing mechanism for Rabi oscillations switches from fluctuations in the qubit energy $E_{\mathrm{Q}}$ to fluctuations in the Rabi frequency $f_{\mathrm{Rabi}}$ at the smallest values of $dE_{\mathrm{Q}}/d\varepsilon$. By decreasing $dE_{\mathrm{Q}}/d\varepsilon$ we have reduced both the Rabi and the Ramsey decoherence rates, important metrics for achieving high-fidelity quantum gate operations, by more than an order of magnitude compared with previous work, demonstrating $\Gamma_\mathrm{Rabi}$ as small as 0.98 MHz and $T_2^* = 1/\Gamma_2^*$ as long as 127 ns. These coherence times exhibit the utility of the extended near-sweet spot in the QDHQ for improving qubit performance in the presence of charge noise.
Methods {#methods .unnumbered}
=======
The Si/SiGe device is operated in a region where magnetospectroscopy measurements [@Simmons:2011p156804; @Shi:2011p233108] have indicated that the valence electron occupation of the double dot is (1,2) for the qubit states studied here. Manipulation pulse sequences were generated using Tektronix 70001A arbitrary waveform generators and added to DC gate voltages on gates L and R using bias tees (PSPL5546). Because of the frequency dependent attenuation of the bias tees, corrections were made to the applied pulses during the adiabatic detuning pulses, as described in Supplementary Section 5. The qubit states were mapped to the (1,1) and (1,2) charge occupation states as described in ref. [@Kim:2015p15004]. A description of the methods used to measure the qubit dispersion and lever arm can be found in Supplementary Section 4.\
Correspondence and requests for materials should be addressed to Mark A. Eriksson (maeriksson*@*wisc.edu)
Acknowledgements {#acknowledgements .unnumbered}
================
This work was supported in part by ARO (W911NF-12-0607, W911NF-08-1-0482), NSF (DMR-1206915, PHY-1104660, DGE-1256259), and the Vannevar Bush Faculty Fellowship program sponsored by the Basic Research Office of the Assistant Secretary of Defense for Research and Engineering and funded by the Office of Naval Research through grant N00014-15-1-0029. Development and maintenance of the growth facilities used for fabricating samples is supported by DOE (DE-FG02-03ER46028). This research utilized NSF-supported shared facilities at the University of Wisconsin-Madison.
Supplemental material for ‘Extending the coherence of a quantum dot hybrid qubit’ {#supplemental-material-for-extending-the-coherence-of-a-quantum-dot-hybrid-qubit .unnumbered}
=================================================================================
These supplemental materials present additional details of the experimental methods used.
S1. Hamiltonian of the quantum dot hybrid qubit {#s1.-hamiltonian-of-the-quantum-dot-hybrid-qubit .unnumbered}
===============================================
The Hamiltonian of the quantum dot hybrid qubit (QDHQ) can be written as $$\begin{pmatrix}
\varepsilon/2 & \Delta_1 & -\Delta_2\\
\Delta_1 & -\varepsilon/2 & 0\\
-\Delta_2 & 0 & -\varepsilon/2 + E_{\mathrm{R}}
\end{pmatrix} .
\label{Hamiltonian}$$ If the tunnel couplings are assumed to be independent of $\varepsilon$, then $\Delta_1$, $\Delta_2$ and $E_{\mathrm{R}}$ can be determined by fitting the spectrum obtained from Eq. (\[Hamiltonian\]) to the measured energy difference between the two lowest states of the QDHQ, $E_\text{Q}(\varepsilon)$. Table \[tab1\] shows the values of $\Delta_{1}$, $\Delta_{2}$ and $E_{\mathrm{R}}$ obtained in this way for the 7 different dot tunings used in this experiment, as described below. The data in Figs. 2(a)-(b) is obtained at tuning 4, the data in Figs. 2(c)-(d) is obtained at tuning 1 while the data in Figs. 2(e)-(h) is obtained at tuning 3. For the data in Figs. 2(a)-(f) we used microwave pulsed Ramsey sequences with $\varepsilon_\text{Ramsey}=0~\mathrm{\mu eV}$ while in Figs. 2(e)-(h) $\varepsilon_\text{Ramsey}=288.6~\mathrm{\mu eV}$. The data in Figs. 3(b)-(e) are obtained at tuning 1, The data in Fig. 3(f) is obtained at tuning 7 while the data in Figs. 3(g) and (i) are acquired at tuning 3. In Fig. 3(h) red points are taken at tuning 1, the green point at tuning 2 and the blue point at tuning 3, here $A_{\varepsilon}$ was kept within 10% of $25~\mathrm{\mu eV}$, as described in Sec. S5. For both Rabi and Ramsey measurements we use the measured energy spectrum to determine the resonant detuning value, $\varepsilon$, corresponding to the microwave frequency, $f_{\mathrm{\mu w}}$, used in the experiments.
Tuning Method $\Delta_{1}~(\mu\mathrm{eV})$ $\Delta_{2}~(\mu\mathrm{eV})$ $E_{\mathrm{R}}~(\mu\mathrm{eV})$
-------- -------- ------------------------------- ------------------------------- -----------------------------------
1 I $18.1\pm1.1$ $46.7\pm3.1$ $51.7$
2 IV $18.0\pm5.9$ $49.0\pm11.9$ $53.6\pm9.4$
3 IV $16.1\pm1.7$ $35.5\pm4.2$ $50.6\pm3.7$
4 I $16.9\pm2.4$ $41.1\pm3.4$ $49.6\pm2.7$
5 II $21.1\pm2.6$ $67.3\pm5.3$ $58.6\pm5.3$
6 IV $15.5\pm1.3$ $33.4\pm3.7$ $50.6\pm2.7$
7 IV $17.3\pm0.8$ $50.2\pm1.3$ $52.0$
: Values of $\Delta_{1}$, $\Delta_{2}$ and ${E}_{\mathrm{R}}$ for each of the tunings used in this experiment. ‘Method’ refers to the Larmor or Ramsey pulse sequences indicated schematically in Fig. 1 of the main text.[]{data-label="tab1"}
S2. Experimental setup {#s2.-experimental-setup .unnumbered}
======================
The experiments were performed in a device with a gate design identical to the one shown in Fig. 1 of the main text, which was placed in a dilution refrigerator with a base temperature $\leq 30~\mathrm{mK}$. The electron temperature is estimated to be $143\pm10~\mathrm{mK}$. [@Simmons:2011p156804]. The device was operated near the (2,1)-(1,2) charge transition. Here, $(n,m)$ refers to a charge occupation of $n$ electrons in the left dot and $m$ electrons in the right dot, modulo a possible closed shell of electrons in one or both dots. All pulse sequences were generated using a Tektronix AWG70001A arbitrary waveform generator (AWG). Manipulations using non-adiabatic pulse sequences were performed by applying pulses while detuned to the charge-like (CL) region, highlighted blue (left part) in Fig. 1, where we initialize to a (2,1) charge occupation. In the charge-like region the two logical states have different charge configurations and are well described by ${\ensuremath{|{0}\rangle}}_\text{CL}={\ensuremath{|{\text{L}}\rangle}}$ and ${\ensuremath{|{1}\rangle}}_\text{CL}={\ensuremath{|{\text{R}}\rangle}}$, where state L (R) corresponds to two electrons in the left (right) quantum dot and one electron in the right (left) quantum dot. This enables readout by projecting the ${\ensuremath{|{0}\rangle}}_\text{CL}$ state onto (2,1) and the ${\ensuremath{|{1}\rangle}}_\text{CL}$ state onto (1,2). Manipulations using microwave pulse sequences were performed by applying microwaves while detuned to the spin-like (SL) region, highlighted green (right part) in Fig. 1, where the initial charge occupation is (1,2). To perform readout, spin-to-charge conversion is implemented near the (1,1) to (1,2) charge transition line, projecting the ${\ensuremath{|{1}\rangle}}_\text{SL}$ state onto a (1,1) charge configuration and the ${\ensuremath{|{0}\rangle}}_\text{SL}$ onto a (1,2) charge configuration. We measure the qubit charge configuration using the methods described in Ref. [@Kim:2015p15004].
S3. Calibration of pulse amplitudes to gate biases {#s3.-calibration-of-pulse-amplitudes-to-gate-biases .unnumbered}
==================================================
The L and R gates can be used to apply high-frequency pulses, including non-adiabatic and microwave-driven pulses. (For simplicity here, we refer to both of these as ac pulses.) The electrostatic coupling between the gates and the dots is the same for any type of pulse. However, ac pulses are intentionally attenuated in our control circuitry, which effectively suppresses the ac lever arm. We can calibrate changes in the amplitude of applied pulses to changes in applied bias on the L gate by applying a 1 ns Larmor pulse to the L(R) gate and sweeping the bias of the L gate over the (2,1)-(1,2) charge polarization line. As the bias is swept, Larmor oscillations cause oscillations in the QPC current. Changing the amplitude of the pulse from $V_{\mathrm{pulse~L(R)}} = 225~(200)~\mathrm{mV}$ to $325~(300)~\mathrm{mV}$ causes a shift in the position of the Larmor oscillation with respect to bias on the L gate, as shown in Fig. \[pulse\_cal\]. For a $\delta{V}_{\mathrm{pulse~L(R)}} = 47.4~(28.8)~\mathrm{mV}$ change in pulse amplitude applied to the L(R) gate the shift was measured to be a $\delta{V}_{\mathrm{L}} = 1.0~\mathrm{mV}$ bias change on the L gate, yielding an effective ratio of pulse amplitudes to gate bias of $$ \frac{\delta\mathrm{V}_{\mathrm{L}}}{\delta\mathrm{V}_{\mathrm{pulse~L(R)}}} = 0.021~(0.035).$$
![ **Calibrating the amplitudes of high-frequency pulses on the L and R gates to dc voltage changes on the L gate.** **a**, The probability of being in the qubit state ${\ensuremath{|{1}\rangle}}$ after applying a 1 ns Larmor pulse (shown in diagram I of Fig. 1), resulting in Larmor oscillations as a function of the ac pulse amplitude on the R gate, ${V}_{\mathrm{Pulse~R}}$, and the dc voltage bias applied to gate L, ${V}_{\mathrm{L}}$. The black line identifies one of the Larmor peaks. In this case, a change of the Larmor pulse amplitude of $\delta{V}_{\mathrm{Pulse~R}} = 28.8~\mathrm{mV}$, corresponds to a shift in the dc bias on the L gate by $\delta{V}_{\mathrm{L}} = 1.0~\mathrm{mV}$. **b**, Analogous result when the Larmor pulse is applied to gate L. In this case, a change of the Larmor pulse amplitude by $\delta{V}_{\mathrm{Pulse~L}} = 47.4~\mathrm{mV}$, corresponds to a shift in the dc bias on the L gate by $\delta{V}_{\mathrm{L}} =1.0~\mathrm{mV}$. []{data-label="pulse_cal"}](Pulse_cal_rev3_2.pdf){width="50.00000%"}
{width="100.00000%"}
S4. Measuring the qubit energy spectrum and determining the lever arms {#s4.-measuring-the-qubit-energy-spectrum-and-determining-the-lever-arms .unnumbered}
======================================================================
The energy difference between the two qubit states was measured as a function of detuning using three different techniques: non-adiabatic Larmor and Ramsey pulse sequences, corresponding to diagrams I and II in Fig. 1 of the main text, and a microwave-pulsed Ramsey sequence corresponding to diagram IV.
For the microwave pulsed Ramsey sequence, initialization and readout are performed in the spin-like regime at the base detuning $\varepsilon_0$, using state-dependent tunneling between the charge configurations $(1,1)$ and $(1,2)$, as described in Sec. S2 and Ref. [@Kim:2015p15004]. at $\varepsilon=\varepsilon_0$. The microwave driving frequency is set to the qubit resonant frequency $f_{\mathrm{\mu w}} = f_{\mathrm{Q}}(\varepsilon_{0}) = E_{\mathrm{Q}}(\varepsilon_{0})/h$, . we adiabatically, the detuning to $\varepsilon=\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}}$ , so that the probabilities of the logical states are unaffected. Phase is accumulated between the logical states during the wait time $t_\text{Free}$, . This procedure yields Ramsey oscillations as a function of the wait time, $t_\text{Free}$, with a frequency given by $E_{\mathrm{Q}}(\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}})/h$. Hence, by measuring the Ramsey oscillation frequency, we can determine the qubit energy, $E_\text{Q}$. By varying $\varepsilon_{0}$ or $\varepsilon_{\mathrm{Ramsey}}$, the energy spectrum can be mapped out over a wide range of detuning values. The microwave method was employed at tunings 2, 3 \[Figs. \[spectrum\](g)-(j)\], 6 and 7 to obtain the corresponding energy spectra. Fitting the data to Eq. (\[Hamiltonian\]) yields the results shown in Table \[tab1\]. The lever arm $\alpha_{\mathrm{\varepsilon,L}}$ was determined by replacing $\varepsilon$ in Eq. (\[Hamiltonian\]) with $\alpha_{\mathrm{\varepsilon,L}}(V_{L}-V_{L,0})$, where $V_{L,0}$ is the $V_{L}$ bias corresponding to $\varepsilon = 0~\mathrm{\mu eV}$, and fitting for $\alpha_{\mathrm{\varepsilon,L}}$. The quality of this fit increases as more points are acquired at negative $\varepsilon$ values where $dE_{Q}/d\varepsilon \rightarrow -1$. The greatest number of points in this regime were acquired at tuning 6, where a fit yielded $$\alpha_{\mathrm{\varepsilon,L}} = 41.36~\mathrm{\mu eV/mV}.$$ We then calculate the lever arm between detuning and ac pulses: $$\alpha_{\mathrm{\varepsilon,L(R)}}^{\mathrm{ac}} = \alpha_{\mathrm{\varepsilon,L}}\frac{\delta\mathrm{V}_{\mathrm{L}}}{\delta\mathrm{V}_{\mathrm{pulse~L(R)}}} = 0.87~(1.46)~\mathrm{\mu eV/mV}.$$ The microwave driving method was also used to obtain the data in Figs. 2 and 3 of the main text. When using the method to determine the FID rate, $\Gamma_{2}^{*}$, it is inconvenient to increase $t_\text{Free}$ to large times, $>T_{2}^{*}$, because the decoherence rate in the spin-like region is very slow compared to the qubit frequency, and measuring for both long times and with short time steps is prohibitively time-consuming. Instead, we obtain a series of widely separated time windows, with good resolution in each window. These windows range in size from 120 to $400~\mathrm{ps}$, encompassing 1.5-6 oscillations, and the separation between the windows is $0.6-22.0~\mathrm{ns}$, getting larger as $\Gamma_2^*$ decreases. A given $\Gamma_2^*$ measurement includes at least 5 such windows.
For the non-adiabatic Ramsey pulse sequence shown schematically in diagram II of Fig. 1, the qubit begins in its ground state at a base detuning value of $\varepsilon_{0} \ll 0$ in the charge-like region. We then pulse the detuning to the avoided crossing at $\varepsilon=0$, where the energy eigenstates are ${\ensuremath{|{0}\rangle}}_{\varepsilon=0}=({\ensuremath{|{0}\rangle}}_\text{CL}-{\ensuremath{|{1}\rangle}}_\text{CL})/\sqrt{2}$ and ${\ensuremath{|{1}\rangle}}_{\varepsilon=0}=({\ensuremath{|{0}\rangle}}_\text{CL}+{\ensuremath{|{1}\rangle}}_\text{CL})/\sqrt{2}$. Waiting at this position for a time ${t}_{\mathrm{p}}$ yields an $\text{X}_{5\pi/2}$ rotation in the original basis, such that the qubit is in state ${\ensuremath{|{-Y}\rangle}}_\text{CL}=({\ensuremath{|{0}\rangle}}_\text{CL}-i{\ensuremath{|{1}\rangle}}_\text{CL})/\sqrt{2}$. We note that a $5\pi/2$ rotation was used here, instead of a $\pi/2$ rotation, because the $20~\mathrm{ps}$ time resolution of our AWG allows us to better match the period of a $5\pi/2$ rotation than a $\pi/2$ rotation. We then pulse to another detuning value, $\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}}$, and wait for a time ${t}_{\mathrm{Free}}$. This results in a phase accumulation of $\psi = e^{-i{t}_{\mathrm{Free}}E_{\mathrm{Q}}(\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}})/\hbar}$ between the logical states, ${\ensuremath{|{0}\rangle}}_{\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}}}$ and ${\ensuremath{|{1}\rangle}}_{\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}}}$. We then pulse back to the avoided crossing, $\varepsilon = 0$, and perform another $\text{X}_{5\pi/2}$ rotation. Finally we pulse back to the base detuning, $\varepsilon_{0}$, and readout the qubit by measuring its charge configuration. Similar to the microwave pulsed Ramsey method, the microwave-driven sequence yields oscillations as a function of the wait time $t_\text{Free}$, with frequency $E_{\mathrm{Q}}(\varepsilon_{0}+\varepsilon_{\mathrm{Ramsey}})/h$. This method was used in Figs. \[spectrum\](a)-(c) to determine the qubit energy spectrum at tuning 5. Fitting the results to Eq. (\[Hamiltonian\]) yields the fitting parameters shown in Table \[tab1\].
Finally, the non-adiabatic Larmor pulse sequence is shown schematically in diagram I of Fig. 1. It involves pulsing the detuning from its base value, $\varepsilon_{0} \ll~0$, to the position $\varepsilon_{0} + \varepsilon_{\mathrm{p}}$. After waiting for a time ${t}_{\mathrm{p}}$, the logical states of the qubit, ${\ensuremath{|{0}\rangle}}_{\varepsilon_{0}+\varepsilon_{\mathrm{p}}}$ and ${\ensuremath{|{1}\rangle}}_{\varepsilon_{0}+\varepsilon_{\mathrm{p}}}$, accumulate a phase difference of $\phi = e^{-i{t}_{\mathrm{p}}E_{\mathrm{Q}}(\varepsilon_{0}+\varepsilon_{\mathrm{p}})/\hbar}$, where $E_{\mathrm{Q}}(\varepsilon_{0}+\varepsilon_{\mathrm{p}})$ is the qubit energy splitting at $\varepsilon=\varepsilon_{0}+\varepsilon_{\mathrm{p}}$. Readout is then performed by pulsing back to $\varepsilon_{0}$ and measuring the charge configuration. By varying $\varepsilon_{0}$ and $\varepsilon_{\mathrm{p}}$, the qubit energy spectrum can again be measured over a wide range of detuning values. This method was employed at tunings 1 \[Figs. \[spectrum\](d)-(f)\] and 4 to obtain the corresponding energy spectra. Fitting these data to Eq. (\[Hamiltonian\]) yields the results shown in Table \[tab1\].
![ **Scope traces of an adiabatic pulse before and after pulse corrections.** **a**, A 500 ns adiabatic pulse with a 0.5 ns in and out adiabatic ramps after passing through a bias-tee. The pulse is repeated every $160~\mathrm{\mu s}$. **b**, Zoomed-in image of the bottom of the pulse in **(a)** showing distortions due to frequency-dependent attenuation. **c**, Zoomed-in image of the top of the pulse in **(a)**, showing distortions due to frequency-dependent attenuation. The behavior of both the top and bottom parts was fitted by subtracting multiple exponential decays of different amplitudes and time constants from the desired pulse shape, Eq. (\[Corrections\]). **d**, A 500 ns adiabatic pulse with a 0.5 ns in and out adiabatic ramps and pulse corrections applied that compensate for the frequency-dependent attenuation. Here, instead of repeating the pulse every $160~\mathrm{\mu s}$, we interleave a pulse with lower opposite amplitude but equal area between measurement pulses to reduce the dc offset.The pulse corrections, in this case, have the same time constants and relative amplitudes obtained by fitting the uncorrected pulse. **e**, Zoomed-in image of the bottom of the corrected pulse shown in **(d)**. **f**, Zoomed-in image of the top of the corrected pulse shown in **(d)**. []{data-label="Pulse_corr"}](Pulse_corrections_rev2.pdf){width="47.00000%"}
S5. Methods for correcting distortions in high frequency pulse sequences {#s5.-methods-for-correcting-distortions-in-high-frequency-pulse-sequences .unnumbered}
========================================================================
An arbitrary waveform generator (AWG) allows for the creation and application of complex pulse sequences. Frequency-dependent attenuation caused by non-ideal RF-components of the experimental apparatus can cause distortions in the pulse shape before reaching the sample. Such is the case with the long adiabatic pulses used to measure the FID rate at the highest measured detunings. Here, the bandwidth between the AWG and the sample is limited by a bias-tee (PSPL5546) located in the coldest stage of the refrigerator ($\le30~\mathrm{mK}$) with a bandwidth from 3.5 KHz to 7 GHz. To compensate for this bandwidth limitation we applied a long adiabatic pulse through an identical bias-tee at room temperature and measured its shape using an oscilloscope (Tektronix DPO72504D), and then applied corrections to the generated pulse until the desired pulse shape was displayed on the oscilloscope. Figs. \[Pulse\_corr\](a)-(c) show the shape of an uncorrected pulse after passing through a bias-tee. To compensate for the consistent dc offset seen in Fig. \[Pulse\_corr\](b) we interleave a second pulse that has the same area (pulse length $\times$ pulse amplitude) and period as the measurement pulse but opposite amplitude. We also find that adding an offset ($A_{b,\mathrm{off}}$) after the measurement pulse but not after the interleaved pulse further reduces the dc offset. To compensate for the shape distortions we fitted 4 different exponential decays with different amplitudes $A_{t(b),i}$ and time constants $\tau_{t(b),i}$ to the difference of the measured pulse top (bottom) to that of the target pulse. All these corrections can be specified using 17 different parameters that are listed in Table. \[pulse\_parameters\].
Correction (i) $\tau_{t(b),i}~(\mathrm{ns})$ $A_{t(b),i}$ Scaling of $A_{t(b),i}~(\mathrm{mV})$
---------------- ------------------------------- -------------- ---------------------------------------
t,1 1.25 19.5 Amplitude
t,2 5.00 -2.0 Amplitude
t,3 30.0 -0.8 Amplitude
t,4 120 4.0 Amplitude
b,1 1.25 -17.5 Area
b,2 5.00 2.0 Area
b,3 80.0 -3.0 Area
b,4 1560 1.5 Area
off - 2.5 Area
: Pulse correction amplitudes and time constants for a 500 ns pulse with 200 mV amplitude and a period of $160~\mathrm{\mu s}$ and a interleaved 4000 ns pulse with -25 mV amplitude and a period of $160~\mathrm{\mu s}$. We find that some correction amplitudes scale with the pulse amplitude while others scale with both the pulse amplitude and duration (pulse area). We find that the time constants are independent of both pulse amplitude and pulse duration.[]{data-label="pulse_parameters"}
The correction is then applied by adding $$\sum_{i=1}^{4}A_{t(b),i}\exp(-t/\tau_{t(b),i})
\label{Corrections}$$
to the top (bottom) segment of the pulse and adding $A_{b,\mathrm{off}}$ after the first pulse. Figs. \[Pulse\_corr\](d)-(f) show the shape of a corrected pulse after passing through the bias-tee. In principle, the corrections can be improved by repeating this process, but in practice, further improvements are limited by the vertical resolution of the AWG (0.5 mV). Due to the frequency dependent attenuation the microwave amplitude, $A_{\varepsilon}$ at the sample changes as $f_{\mathrm{\mu w}}$ is changed. This was corrected for by measuring $A_{\varepsilon}$ at each $f_{\mathrm{\mu w}}$ used after passing a mircowave through the room temperature bias-tee and adjusting $A_{\varepsilon}$ until it was within $10\%$ of $A_{\varepsilon} = 25~\mathrm{\mu eV}$.
{#section .unnumbered}
-- -- --
-- -- --
: .[]{data-label="t2values"}
[10]{} url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{}
& . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
. ** ****, ().
*et al.* . ** ****, ().
, , , & . ** ****, ().
, , & . ** ****, ().
*et al.* . ** ****, ().
, , , & . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** (). arXiv:.
, , , & . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
& . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
, & . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
& . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
, & . ** ****, ().
*et al.* . ** ****, ().
, , , & . ** ****, ().
. ** .
, , & . ** ****, ().
*et al.* . ** ****, ().
. ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
, , & . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
, & . ** ****, ().
*et al.* . ** ****, ().
[^1]: Current address: Sandia National Laboratories, Albuquerque, NM 87185, USA.
|
Molecular evidence for pap-G specific adhesion of Escherichia coli to human renal cells.
To study the interaction between class II G-adhesin of Escherichia coli and human urogenital cells. The adherence of two wild type P-fimbriated E. coli strains, both carrying a class II G-adhesion, and two constructed mutants (one class II G-adhesion knock-out mutant and one class switch mutant in which the papG gene was exchanged with a prsJ96 allele which is a representative of the class III G-adhesin) to human urogenital cells were examined by light microscopy and flow cytometry. The wild type E. coli strains adhered avidly to proximal tubular cells, but the isogenic mutant strains did only adhere in one of the experiments. A soluble receptor analogue inhibited bacterial attachment. These experiments strongly suggest that the papG class II tip adhesin of P-fimbriae is essential in the pathogenesis of human kidney infection. |
Whatever we finally see from the Mueller report, it’s clear there will be no coup de grace so politically devastating that Donald Trump would leave office mid-term. But does that mean Trump’s supporters won’t ever turn on him? I think I know the answer. It’s partly because I’ve been in their place.
During Watergate I was a die-hard Nixon dead-ender. I stuck with him after the Saturday Night Massacre in the fall of 1973 and the indictments of Nixon aides H.R. Haldeman and John Ehrlichman in 1974. Not until two months before Nixon resigned did I finally decide enough’s enough.
What was wrong with me? I’ve been haunted by that question for decades.
I can clear up one thing immediately. I didn’t support Nixon out of ignorance. I was a history major at Vassar during Watergate and eagerly followed the news. I knew exactly what he’d been accused of.
The fact is the facts alone didn’t matter because I’d already made up my mind about him. My fellow Vassar students—all liberals, of course—pressed me to recant. But the more they did, the more feverish I became in my defense. I didn’t want to admit I was wrong (who does?) so I dreamed up reasons to show I wasn’t—a classic example of cognitive dissonance in action.
A pioneering study by social psychologist Elliot Aronson conducted in the 1950s helps explain my mental gymnastics. Young college women invited to attend a risqué discussion of sexuality were divided into two groups. One group was put through a preliminary ritual in which they had to read aloud a list of words like “prostitute,” “virgin,” and “petting.” The other group had to say out loud a dozen obscenities including the word “fuck.” Afterwards, the members of both groups were required to attend a discussion on sex, which is what had been the draw. But it turned out they had all been duped. The discussion wasn’t risqué. The subject turned out to be lower-order animal sexuality. Worse, the people leading the discussion spoke in a monotone voice so low it was hard to follow what they were saying.
Following the exercise the students were asked to comment on what they had been through. You might expect the students who went through the embarrassing rite of speaking obscenities to complain the loudest about the ordeal. But that isn’t what happened. Rather, they were more likely to speak positively about the experience.
The theory of cognitive dissonance explains why. While all of the subjects in the experiment felt unease at being duped, those for whom the experience was truly onerous felt a more compelling need to explain away their decision to take part. The solution was to reimagine what had happened. By rewriting history they could tell themselves that what had appeared to be a bad experience was actually a good one. Dissonance begone.
This is what I did each time one of my Vassar friends pointed to facts that showed Nixon was lying.
Neuroscience experiments in the 21st century by Drew Westen show what happens in our brain when we confront information at odds with our commitments. In one study, supporters of President George W. Bush were given information that suggested he had been guilty of hypocrisy. Instead of grappling with the contradiction they ignored it. Most disturbing of all, this happened out of conscious awareness. MRI pictures showed that when they learned of Bush’s hypocrisy, their brains automatically shut off the “spigot of unpleasant emotion.” (It’s not a uniquely Republican trait; the same thing happened with supporters of John Kerry.)
In short, human beings want to be right and we want our team to win. But we knew all that, right? Anybody who’s taken a Psych 101 class knows about confirmation bias: that humans seek out information that substantiates what they already believe; and bounded rationality: that human reason is limited to the information sources to which we are exposed; and motivated reasoning: that humans have a hard time being objective.
But knowing all this isn’t enough to understand why Trump voters are sticking with Trump.
What’s required instead is a comprehensive way to think about the stubbornness of public opinion and when it changes. Until a few decades ago no one had much of a clue what a comprehensive approach might look like. All people had to go on was speculation. Then scientists operating in three different realms — social psychology, neuroscience, and political science — began to delve into the working of the human brain. What they wanted to know was how we learn. The answer, most agreed, was that the brain works on a dual-process system, a finding popularized by Daniel Kahneman, the Nobel prize-winning Princeton psychologist, in the book, Thinking Fast and Slow.
One track, which came to be known as System 1, is super-fast and happens out of conscious awareness, the thinking you do without thinking.
There are two components to System 1 thinking. One involves what popularly is thought of as our animal instincts, or what social scientists refer to, with more precision, as evolved psychological mechanisms. Example: the universal human fear of snakes. The other involves ways of thinking shaped by habit. The more you perform a certain task, the more familiar it becomes and the better you get at it without having to think about it.
Donald Trump likes to say that he goes with his gut. What he’s saying, likely without knowing it, is that he has confidence in his System 1. This is not exceptional. Most of us trust our instincts most of the time. What distinguishes Trump is that he seems to privilege instinct over reason nearly all of the time.
The second track, System 2, is slower and allows for reflection. This mode, which involves higher-order cognitive thinking, kicks in automatically when our brain’s surveillance system detects a novel situation for which we aren’t prepared by experience. At that moment we shift from unconscious reaction to conscious thinking. It is System 2 that we rely on when mulling over a difficult question involving multiple variables. Because our brain is in a sense lazy, as Kahneman notes, and System 2 thinking is hard, our default is System 1 thinking.
One thing that’s worth noting about System 1 thinking is that our brains are essentially conservative. While humans are naturally curious about the world and we are constantly growing our knowledge by, in effect, adding books to the shelves that exist in our mind’s library, only reluctantly do we decide to expand the library by adding a new shelf. And only very rarely do we think to change the system by which we organize the books on those shelves. Once we settle on the equivalent of the Dewey Decimal System in our mind, it’s very hard to switch to another system. This is one of the main reasons why people are almost always reluctant to embrace change. It’s why inertia wins out time and time again.
But change we do, thanks to System 2. But what exactly triggers System 2 when it’s our politics that are on the line? Social scientists finally came up with a convincing explanation when they began studying the effect of emotion on political decision-making in the 1980s.
One of the pioneers in this research is George Marcus. When Marcus was starting out as a political scientist at Williams College he began to argue that the profession should be focusing more on emotion, something they’d never done, mainly because emotion is hard to quantify and count and political scientists like to count things. When Marcus began writing papers about emotion he found he couldn’t find editors who would publish them.
But it turned out his timing was perfect. Just as he was beginning to focus on emotion so were neuroscientists like Antonio Damasio. What the neuroscientists were learning was that the ancient belief that emotion is the enemy of reason is all wrong. Rather, emotion is the handmaiden of reason. What Damasio discovered was that patients with a damaged amygdala, the seat of many emotions, could not make decisions. He concluded: The “absence of emotion appears to be at least as pernicious for rationality as excessive emotion.”
If emotion is critical to reason, the obvious question became: which emotion triggers fresh thinking? Eventually Marcus and a handful of other political scientists who shared his assumption that emotion is important to decision making became convinced that the one that triggers reappraisals is anxiety. Why anxiety? Because it turned out that when people realize that the picture of the world in their brain doesn’t match the world as it actually exists, their amygdala registers a strong reaction. This is felt in the body as anxiety.
Eventually, Marcus and his colleagues came up with a theory that helps us understand when people change their minds. It became known as the Theory of Affective Intelligence (later: the Theory of Affective Agency). The theory is straightforward: The more anxiety we feel the more likely we are to reconsider our beliefs. We actually change our beliefs when, as Marcus phrases it, the burden of hanging onto an opinion becomes greater than the cost of changing it. Experiments show that when people grow anxious they suddenly become open to new information. They follow hyperlinks promising fresh takes and they think about the new facts they encounter.
How does this help us understand Trump supporters? It doesn’t, if you accept the endless assertions that Trump voters are gripped by fear and economic anxiety. In that case, they should be particularly open to change. And yet they’re as stuck on Trump as I was on Nixon.
The problem isn’t with the theory. It’s with the fear and anxiety diagnosis.
Humans can multiple feelings at odds with one another simultaneously, but research shows that only one emotion is likely to affect their politics. The dominant emotion characterizing so-called populist voters like those attracted to Trump is anger, not fear. This has been found in studies of populists in France, Spain, Germany and Britain as well as the United States.
If the researchers are right that populists are mostly angry, not anxious, their remarkable stubbornness immediately becomes explicable. One of the findings of social scientists who study anger is that it makes people close-minded. After reading an article that expresses a view contrary to their own, people decline to follow links to find out more information. The angrier you become, the less likely are to welcome alternative points of view.
That’s a powerful motive for ignoring Trump’s thousands of naked lies.
Why did I finally abandon Nixon? For months and months I had been angry over Watergate. Not angry at Nixon, as you might imagine, but angry at the liberals for beating up on him. Nixon fed this anger with repeated attacks on the people he perceived as his enemies. As long as I shared his anger I wasn’t prepared to reconsider my commitment to his cause.
But eventually there came a point when I stopped being angry and became anxious.
I would guess that what happened is that over time Nixon’s attacks came to seem shopworn and thin. Defending him became more of a burden than the cost of abandoning him.
If I am right about the circuitous path I took from Nixon supporter to Nixon-basher, there’s hope that Trump supporters will have their own Road to Damascus epiphany. Like me, they may finally tire of anger, though who knows. Right-wing talk radio and Fox News have been peddling anger for years and the audience still loves it.
It took me 711 days from the time of the Watergate burglary to my break with Nixon, when I resigned from a committee defending him, to come to my senses. As this is published, it has been 812 days since Trump became president. And there’s little indication that Trump voters have reached an inflection point.
Any of a number of disclosures could disillusion a substantial number of them. We have yet to read the full Mueller report. Nor have we yet seen Trump’s tax returns, which might prove politically fatal if they show he isn’t really a billionaire or if they prove his companies depended on Russian money. (As Mitt Romney suggested, the returns likely contain a bombshell.)
If Trump’s disclosures suggest to his supporters that they were chumps to believe in him his popularity no doubt would begin eroding. And already there’s evidence his support has weakened. In January 51 percent of GOP or GOP-leaning voters said they considered themselves more a supporter of Donald Trump than the Republican Party. Two months later the number had declined to 43 percent. If this slippage is because more supporters feel they are embarrassed to come out as full-blown Trumpies he may be in trouble come election day.
In the end, politics is always about the voters. Until now, Trump has made his voters by and large feel good about themselves by validating their anger. But there remains the possibility that in the coming months disclosures may make them feel that they have been conned, severely testing their loyalty. If the anger they feel either wears off or is redirected at Trump himself their amygdala should send them a signal indicating discomfort with the mismatch between the known facts and their own commitments.
This presupposes that they can get outside the Fox News and conservative talk bubble so many have been living inside. Who knows if they will. It is worth remembering that even in Nixon’s day, millions remained wedded to his lost cause even after the release of the smoking-gun tape. On the day he resigned, August 9, 1974, 50 percent of Republicans still supported him even as his general approval dropped to 24 percent.
To sum up: Facts finally count if enough loyalists can get past their anger to see the facts for what they are. But people have to be exposed to the facts for this to occur. And we can’t be sure that this time they will be. |
Reviews of this business
(1)
Overall review sentiment
Top 3 sentiment words
Overall review sentiment
Rating distribution
Other reviews from the web
(1)
A very New England course
Average Rating
80
Thorny Lea, condition wise, was one of the best courses we played in 2015. Tees and fairways were in fantastic condition and the greens rolled fairly true considering we were playing probably a week after they were punched. The course is very New England with tree lined fairways and not a lot of hazards that come into play. You do have to play smart and take what the course gives you, meaning... |
package B with
Abstract_State => (State,
(Atomic_State with External))
is
procedure Read_State (X : out Boolean);
procedure Read_Atomic_State (X : out Boolean);
end B;
|
[Cite as State v. Putnam, 2018-Ohio-3724.]
IN THE COURT OF APPEALS OF OHIO
SEVENTH APPELLATE DISTRICT
BELMONT COUNTY
STATE OF OHIO,
Plaintiff-Appellee,
v.
JAMES CHRISTOPHER PUTNAM,
Defendant-Appellant.
OPINION AND JUDGMENT ENTRY
Case No. 17 BE 0036.
Criminal Appeal from the
Court of Common Pleas of Belmont County, Ohio
Case No. 17 CR 33.
BEFORE:
Gene Donofrio, Cheryl L. Waite, Carol Ann Robb, Judges.
JUDGMENT:
Reversed and Remanded.
Atty. Daniel P. Fry, Prosecuting Attorney, and Atty. J. Flanagan, Assistant Prosecuting
Attorney, Belmont County Courthouse Annex 1, 147-A West Main Street, St. Clairsville,
Ohio 43950, for Plaintiff-Appellee, and
Atty. Dennis Belli, 536 South High Street, Floor 2, Columbus, Ohio 43215, for
Defendant-Appellant.
Dated:
September 13, 2018
–2–
Donofrio, J.
{¶1} Defendant-appellant, James Putnam, appeals from a Belmont County
Common Pleas Court judgment convicting him of failure to comply with the order of a
police officer, following his guilty plea.
{¶2} On October 1, 2016, a state highway patrol trooper clocked appellant
travelling at 97 miles per hour in a 65-miles-per-hour zone. The trooper activated his
light and siren but appellant did not pull over. With lights and sirens activated, the
trooper continued to pursue appellant. Appellant disregarded stop signs, cut through
berms, traveled left of center, and passed vehicles while driving off the right side of the
roadway. The pursuit continued through Bethesda, where appellant eventually traveled
off the right side of the roadway, striking mailboxes and an embankment. Appellant
then turned into a residential yard, where he bailed out of the vehicle. Appellant ran into
the woods. Troopers caught up with appellant and placed him under arrest.
{¶3} A grand jury indicted appellant on one count of failure to comply, a third-
degree felony in violation of R.C. 2921.331(B)(C)(5)(a)(ii); and one count of driving
under the influence, a first-degree misdemeanor in violation of R.C. 4511.19(A)(1)(a).
Appellant initially pleaded not guilty.
{¶4} Following a Crim.R.11 plea agreement, appellant changed his plea to
guilty of failure to comply. In exchange, plaintiff-appellee, the State of Ohio, dropped
the charge for driving under the influence. The trial court accepted appellant’s plea and
subsequently sentenced him to 36 months in prison. In addition, the court suspended
appellant’s driving privileges for three years.
{¶5} Appellant filed a timely notice of appeal on August 2, 2017. He now raises
four assignments of error.
{¶6} Because appellant’s second assignment of error is dispositive of this
appeal, we will address it first.
{¶7} Appellant’s second assignment of error states:
Case No. 17 BE 0036
–3–
THE TRIAL COURT’S FAILURE TO ASCERTAIN DEFENDANT-
APPELLANT’S UNDERSTANDING OF THE DEGREE OF OFFENSE TO
WHICH HE WAS PLEADING GUILTY, THE MAXIMUM TERM OF
IMPRISONMENT FOR THE OFFENSE, AND THE APPLICABILITY OF A
MANDATORY DRIVER’S LICENSE SUSPENSION, RESULTED IN A
LACK OF SUBSTANTIAL COMPLIANCE WITH THE REQUIREMENTS
OF CRIM.R. 11.
{¶8} Here, appellant argues that the trial court failed to comply with Crim.R.
11(C) in accepting his guilty plea. Thus, he asserts he did not enter his plea knowingly,
voluntarily, and intelligently. Appellant goes on to argue that the trial court failed to
determine whether he understood the maximum penalties of the offense.
{¶9} When determining the validity of a plea, this court must consider all of the
relevant circumstances surrounding it. State v. Trubee, 3d Dist. No. 9-0365, 2005-Ohio-
552, ¶ 8, citing Brady v. United States, 397 U.S. 742, 90 S.Ct. 1463 (1970). Pursuant to
Crim.R. 11(C)(2), the trial court must follow a certain procedure for accepting guilty
pleas in felony cases. Before the court can accept a guilty plea to a felony charge, it
must conduct a colloquy with the defendant to determine that he understands the plea
he is entering and the rights he is voluntarily waiving. Crim.R. 11(C)(2). If the plea is not
knowing, intelligent, and voluntary, it has been obtained in violation of due process and
is void. State v. Martinez, 7th Dist. No. 03-MA-196, 2004-Ohio-6806, ¶ 11, citing Boykin
v. Alabama, 395 U.S. 238, 243, 89 S.Ct. 1709 (1969).
{¶10} Because appellant has asserted that he did not enter his plea knowingly,
voluntarily, and intelligently, we must examine the plea colloquy to determine if the trial
court met all of the requirements that Crim.R. 11(C) demands.
{¶11} A trial court must strictly comply with Crim.R. 11(C)(2) pertaining to the
waiver of five federal constitutional rights. Martinez, 7th Dist. No. 03-MA-196, ¶ 12.
These rights include the right against self-incrimination, the right to a jury trial, the right
to confront one's accusers, the right to compel witnesses to testify by compulsory
process, and the right to proof of guilt beyond a reasonable doubt. Crim.R. 11(C)(2)(c).
{¶12} A trial court need only substantially comply with Crim.R. 11(C)(2)
pertaining to non-constitutional rights such as informing the defendant of “the nature of
Case No. 17 BE 0036
–4–
the charges with an understanding of the law in relation to the facts, the maximum
penalty, and that after entering a guilty plea or a no contest plea, the court may proceed
to judgment and sentence.” Martinez, supra, ¶ 12, citing Crim.R. 11(C)(2)(a)(b).
{¶13} As to his constitutional rights, at the change of plea hearing the trial court
advised appellant that by changing his plea he was giving up the right to confront
witnesses against him, the right to compulsory service of witnesses in his favor, the right
to have the state prove his guilty beyond a reasonable doubt, and the right to not be
compelled to testify against himself. (Plea Tr. 5).
{¶14} The trial court also advised appellant that he was giving up his right to a
“speedy and public trial.” (Tr. 5). But the court did not advise appellant that he was
waiving his right to a “jury” trial. The right to a jury trial is one of the five constitutional
rights that Crim.R. 11(C)(2)(c) requires the trial court to advise a defendant of before
accepting a guilty plea.
{¶15} This court recently reversed an appellant’s conviction where the trial court
employed the same language that the court used in this case. In State v. Thomas, 7th
Dist. No. 17 BE 0014, 2018-Ohio-2815, ¶ 12, when conducting the change of plea
colloquy, the trial court asked Thomas if he understood he was waiving the right “to a
speedy and public” trial. On appeal, we noted that in “some cases when a reviewing
court is faced with this situation, the court can conclude there was a valid waiver by
finding the reference to a jury was orally made when explaining some other aspect of
the plea.” Id. at ¶ 13. But we found that in Thomas’s case, there was no reference to a
jury in any other part of the plea transcript. Id. at ¶ 15. Because “strict compliance with
the plea advisements on constitutional rights is required,” we reversed Thomas’s
conviction based on the trial court’s failure to advise Thomas that he was waiving his
right to a jury trial. Id. at ¶¶ 1, 16.
{¶16} As was the case in Thomas, the trial court in this case made no reference
whatsoever to appellant’s right to a jury trial. Instead, it referred only to a right to a
“speedy and public trial.” Because this language does not strictly comply with Crim.R.
11(C)(2) by advising appellant of his constitutional right to jury trial, appellant’s plea was
not entered knowingly, voluntarily, and intelligently.
Case No. 17 BE 0036
–5–
{¶17} Appellant goes on to argue that the trial court failed to advise him of the
possible penalties he faced. As noted above, the trial court need only show substantial
compliance with Crim.R. 11(C)(2) pertaining to non-constitutional rights including
informing the defendant of the maximum penalty, the nature of the charges, and that
after entering a guilty plea the court may proceed to judgment and sentence. Martinez,
supra, ¶ 12, citing Crim.R. 11(C)(2)(a)(b).
{¶18} In this case, the trial court informed appellant that upon accepting his plea
it could immediately proceed to judgment and sentence. (Plea Tr. 6). The court
questioned appellant’s attorney, asking if he had explained to appellant the charge to
which he was pleading, the degree of the felony, and the minimum and maximum
punishments. (Plea Tr. 3). Appellant’s attorney indicated that he had explained each of
these items to appellant. (Plea Tr. 3). The court then asked appellant if his attorney
had explained everything to him, if he realized which offense he was pleading to, and if
he understood what the maximum sentence could be. (Plea Tr. 4). Appellant stated
that he understood each of these items. (Plea Tr. 4-5). Additionally, appellant told the
court that he had reviewed the plea agreement with his counsel and that he understood
its terms. (Plea Tr. 5). The plea agreement plainly stated that appellant was pleading
guilty to third-degree felony failure to comply and that he faced a maximum prison term
of three years and a license suspension. Based on these circumstances, the trial court
substantially complied with Crim.R. 11(C) in informing appellant of his non-constitutional
rights.
{¶19} But because the trial court did not strictly comply with Crim.R. 11(C)(2) in
advising appellant of his constitutional right to a jury trial before accepting his guilty
plea, appellant’s plea was not valid.
{¶20} Accordingly, appellant’s second assignment of error has merit and is
sustained.
{¶21} Appellant’s remaining assignments of error state, respectively:
WITHOUT AN EXPRESS ADMISSION BY DEFENDANT-
APPELLANT TO AN AGGRAVATING FACT THAT ELEVATES A
MISDEMEANOR VIOLATION OF R.C. 2921.331 TO A FELONY, THE
IMPOSITION OF A SENTENCE FOR A THIRD-DEGREE FELONY
Case No. 17 BE 0036
–6–
VIOLATED HIS RIGHTS UNDER THE SIXTH AND FOURTEENTH
AMENDMENTS TO THE UNITED STATES CONSTITUTION.
THE TRIAL COURT’S RELIANCE ON DEFENDANT-
APPELLANT’S PRIOR HISTORY OF CHARGES FOR WHICH THE
DISPOSITION LISTED IN THE PRESENTENCE REPORT IS
“UNKOWN,” TO JUSTIFY A MAXIMUM PRISON TERM, RESULTED IN A
SENTENCE THAT IS CLEARLY AND CONVINCINGLY UNSUPPORTED
BY THE RECORD AND/OR IS CONTRARY TO LAW.
DEFENDANT-APPELLANT WAS DENIED HIS RIGHT TO THE
EFFECTIVE ASSISTANCE OF COUNSEL, AS GUARANTEED BY THE
SIXTH AND FOURTEENTH AMENDMENTS TO THE UNITED STATES
CONSTITUTION, DUE TO MULTIPLE INSTANCES OF DEFICIENT
PERFORMANCE.
{¶22} Given our resolution of appellant’s second assignment of error, appellant’s
first, third, and fourth assignments of error are rendered moot.
{¶23} For the reasons stated above, the trial court’s judgment is hereby reversed
and the matter is remanded to the trial court for further proceedings pursuant to law and
consistent with this opinion.
Waite, J., concurs
Robb, P. J., concurs
Case No. 17 BE 0036
[Cite as State v. Putnam, 2018-Ohio-3724.]
For the reasons stated in the Opinion rendered herein, appellant’s second
assignment of error is sustained and it is the final judgment and order of this Court that
the judgment of the Court of Common Pleas of Belmont County, Ohio, is reversed.
Appellant’s first, third, and fourth assignments of error are rendered moot. We hereby
remand this matter to the trial court for further proceedings according to law and
consistent with this Court’s Opinion. Costs to be taxed against the Appellee.
A certified copy of this opinion and judgment entry shall constitute the mandate in
this case pursuant to Rule 27 of the Rules of Appellate Procedure. It is ordered that a
certified copy be sent by the clerk to the trial court to carry this judgment into execution.
NOTICE TO COUNSEL
This document constitutes a final judgment entry.
|
Main navigation
Smith: A Premature Burial of Electronic Arts
Photo courtesy of Creative Commons
As the late Catholic historian John Dalberg-Acton said, “Power corrupts, and absolute power corrupts absolutely.”
Look no further than video game publisher Electronic Arts for a modern day example. The company (and others like it) have been under fire for their use of randomized loot boxes players pay real money for (i.e. gambling), and has now attracted the attention of Congress.
Hawaii state representative Chris Lee condemned what he describes as “predatory practices” in video games last week, and made a specific example of the recently released Electronic Arts title “Star Wars Battlefront 2.”
The game itself is an abomination of game design forcing players to spend money on random rewards if they hope to compete against the online hordes. The game itself is $60, but to get everything you need in terms of in-game supplies, you can spend upwards of $1,500.
Or you can get rewarded by grinding through the repetitive multi-player mode. Electronic Arts made some panicked, last-minute changes to the progression system to appease consumers, but before then, it would have taken more than 4,000 hours to unlock everything.
That high barrier, and pretty much every other system in the game, encourages players to skip the artificial grind of leveling up by spending real money — like you would in a mobile game. Most mobile games are free until you start paying, though.
Rep. Lee is one year younger than me, and is likely one of the few congressman who understand (or care) about Electronic Arts’ shady business practices. He described ”’Star Wars Battlefront 2″ as a “Star Wars-themed online casino designed to lure kids into spending money.”
I couldn’t have said it any better. I’m tempted to move to Hawaii just to vote for him. Fellow state reps have already heard Lee’s cry of “monolith game publisher pushes gambling to children,” and it’s a rallying cry that knows no partisanship bounds.
Most hardcore gamers saw this coming. And you think someone at EA would have warned the clueless company executives. But when you live in a bubble of greed and disdain for your customers, it’s easy to sell yourself on the idea that gamers would grumble a bit before coughing up the dough.
Odds are, “Star Wars Battlefront II” will still make a lot of money, and EA suspended the loot boxes when their partner, Big Daddy Disney, intervened. That was before multiple countries like Belgium and Australia launched investigations into loot boxes to determine if they should be made illegal.
I can hear the scraping sounds of Big Daddy Disney sharpening his blade, getting ready to ax at least a few clueless executives for the bad press. Disney came awfully close to tainting their own brand a few decades ago when artists snuck in hidden sexual references in movies such as “Aladdin” and “The Lion King.”
I’m probably letting my paranoid gaming activism show, but there’s the minute chance that Disney could buy and shutter EA altogether to avoid the bad press. When it comes to video games, Electronic Arts is one of the two biggest game publishers in the industry, along with Activision. But they’re nothing more than a crumb on billion dollar table set by Disney, and protecting the “Star Wars” franchise is of utmost importance to them.
Rise of power, descent of decency
I’m old enough to remember when Electronic Arts was a small, ambitious studio that earned the respect of gamers through unique, off-the-wall action and adventure games. Their early sports games greatly outpaced their competitors, and adding a name like John Madden helped immensely with that.
Electronic Arts were the cool kids of the video game world. They didn’t make games for the Nintendo Entertainment System, because Nintendo demanded exclusivity. They instead made their name on the Sega Genesis console.
My personal favorite was the Genesis port of “Populous.” Considered to be the first “God game,” “Populous” (which was released the same year as the original Sim City) let the player decided the fate of a planet by building structures, changing the shape of the land and guiding followers. The more your followers worshiped you, the more power you had to unleash natural disasters on non-believers.
“Populous” was relatively unknown when it came out, and I could only find it at the long-defunct Video Warehouse (which now houses the Mississippi Valley Regional Blood Center). The cartridges Electronic Arts put out were quite different from other games, featuring a plastic yellow tab on the right side for no particular reason.
That’s part of what made Electronic Arts so cool. It didn’t follow the crowd. The company considered their games works of art, and would sometimes credit the game’s creators on the front of the box in a “Steven Spielberg presents” kind of way. Money seemed secondary, even if it wasn’t. It was a benefit of good, original work.
But then EA started to grow, swallowing every company in their wake. First it was the “Populous” developer Bullfrog and Origin Systems, responsible for the “Wing Commander” series. These days, Electronic Arts shuts down every developer it buys, watering down the developer’s unique games to the point of faceless homogenization. Electronic Arts recently closed down Pandemic Studio, which was in the middle of making a single-player, story-driven “Star Wars” game. The idea from now on is to focus on cheaper multiplayer games that can make millions through micro-transactions and loot boxes.
It would have worked, if millennial gamers hadn’t caused such a stink. I’ve said it before, but Millennials don’t take any crap. I wish I was more like them.
Hopefully we can dance on the grave of Electronic Arts in the near future. It has finally been exposed for the greedy corporate dinosaur it is, and competing companies are piling on, advertising their games as quality works untainted by sleazy gambling mechanics. |
The EU Nitrates Directive states a threshold level of 50 mg/l nitrate in groundwater. In the Netherlands, compliance is currently checked in the upper one meter of groundwater. A draft EU monitoring guideline leaves open the possibility to check compliance in the upper five meters of groundwater. The nitrate concentration in groundwater in the Netherlands has significantly decreased between 1996 and 2004 due to policy measures. Nitrate concentrations are below the EU threshold level in large parts of the Netherlands. In sandy soils, however, the average nitrate concentration still exceeds the 50 mg/l value in the upper one meter of the groundwater. Additional measures are required to meet EU threshold values. Changing the checking level from the upper one meter to the upper five meters of groundwater could provide the Netherlands with the possibility to meet the EU threshold level for groundwater, without having to implement major additional measures by farmers. Nitrate concentrations are likely to decrease with depth because of denitrification. Any adjustment in the compliance checking level requires well-founded data on whether nitrate concentrations actually decrease with depth in the upper five meters of the groundwater. It must also be clear which processes cause the decrease, and in particular whether such an adjustment would result in a shifting of the problems to the surface water. The Nitrates Directive also has targets for surface water quality. A study showed that in sandy soils with relatively deep groundwater tables (i.e. > 1 meter) nitrate concentrations did not decrease with depth in the upper five meters of groundwater. Here, the act of denitrification may be blurred by temporal changes in nitrate leaching from the soil. In sandy soils with high and intermediate groundwater tables (within 1 meter) a decrease in nitrate concentrations with depth was shown. Results indicated that in these soils significant loads of agricultural nitrate are transported into surface waters. Thus, allowing higher nitrate concentrations in the upper groundwater may cause eutrophication of surface waters. The Dutch Parliament introduced a motion in 2009 stating that maintaining the current compliance checking level in the upper one meter of groundwater would result in unfair competition for Dutch farmers. The Dutch Parliament requested the Government to calculate the decrease in nitrate with depth using models and to measure the nitrate concentrations not only in the upper one meter of groundwater, but in the upper second and upper fifth meter of groundwater as well. A new monitoring network to meet the Parliaments request is currently drafted. |
---
abstract: 'The form factors of the descendant operators in the massive Lee-Yang model are determined up to level 7. This is first done by exploiting the conserved quantities of the integrable theory to generate the solutions for the descendants starting from the lowest non-trivial solutions in each operator family. We then show that the operator space generated in this way, which is isomorphic to the conformal one, coincides, level by level, with that implied by the $S$-matrix through the form factor bootstrap. The solutions we determine satisfy asymptotic conditions carrying the information about the level that we conjecture to hold for all the operators of the model.'
---
SISSA 09/2005/FM
\
\
\
[*via Beirut 2-4, 34014 Trieste, Italy*]{}\
[*INFN sezione di Trieste*]{}\
[*E-mail: [email protected], [email protected]*]{}\
Introduction
============
A massive quantum field theory can be seen as the perturbation of a fixed point (conformal) theory by relevant or marginally relevant operators. The perturbation spoils some simple features of the conformal point, as the power law behavior of two-point functions, but preserves some structural properties. In particular, the operator space of the massive theory is expected to be isomorphic to that of the conformal theory. In principle, this expectation can be checked in $1+1$ dimensions even for non-trivial fixed points, due to the existence of integrable quantum field theories. What makes the check far from obvious is that the operator content at and away from criticality is determined in two completely different ways.
On one hand, the operator content at the conformal point is dictated by the representation theory of the Virasoro algebra underlying the infinite dimensional conformal symmetry in two dimensions [@BPZ]. This reveals a structure of operator families, each consisting of a primary operator and an infinite tower of descendants organized into multiplets (levels) labeled by integer spaced scaling dimensions. On the massive side, instead, integrable quantum field theories are solved through the exact determination of the $S$-matrix [@Taniguchi]. The operators are then constructed determining their matrix elements (form factors) on the particle states as solutions of a set of functional equations [@KW; @Smirnov].
It was first shown in [@CM] for the thermal Ising model, and later for more complicated models [@Koubek; @Smirnovcounting; @JMT], that the global counting of independent solutions of the form factor equations matches that expected from conformal field theory. This counting procedure for the form factor solutions, however, disentangles neither the operator families sharing the same symmetry properties nor the levels of the descendants.
In this paper we tackle the problem of the detailed isomorphism between the critical and off-critical operator spaces for the simplest interacting massive theory, the Lee-Yang model. The previously available results for the operators of this model concern the non-trivial primary operator [@Alyosha] and the first non-trivial scalar descendant $T\bar{T}$ of the identity family [@ttbar]. We exploit the first few quantum integrals of motion of the theory to determine, for the two operator families of the model and for each level up to 7, a number of independent form factor solutions coinciding with the number predicted by conformal field theory. We then show that the operators constructed in this way do form a basis for the space of solutions of the form factor equations up to level seven. This is achieved by supplementing the form factor equations with asymptotic conditions carrying the information about the level. We also show that all the new solutions determined in this paper automatically satisfy the asymptotic factorization property for the descendant operators conjectured in [@ttbar].
The paper is organized as follows. In the next section we recall the structure of the operator space at criticality as well as the $S$-matrix and form factor language used for the integrable massive deformations. In section 3 we specialize the discussion to the Lee-Yang model before turning to the construction of the off-critical descendant operators through the use of the conserved quantities in section 4. In section 5 we show the isomorphism with the operator space spanned by the solutions of the form factor equations, while section 6 contains few final remarks. Three appendices conclude the paper.
Critical and off-critical operators
===================================
The operators at a critical point undergo the general conformal field theory classification [@BPZ]. A scaling operator $\Phi (x)$ is first of all labeled by a pair $(\Delta _{\Phi },\bar{\Delta}_{\Phi })$ of conformal dimensions which determine the scaling dimension $X_{\Phi }$ and the euclidean spin $s_{\Phi }$ as $$\begin{aligned}
&&X_{\Phi }=\Delta _{\Phi }+\bar{\Delta}_{\Phi } \\
&&s_{\Phi }=\Delta _{\Phi }-\bar{\Delta}_{\Phi }.\end{aligned}$$ Locality requires that $s_{\Phi }$ is an integer or half-integer number. There exist operator families associated to the highest weight representations of the Virasoro algebra $$\lbrack L_{n},L_{m}]=(n-m)L_{n+m}+\frac{c}{12}n(n^{2}-1)\delta _{n+m,0}\,.
\label{virasoro}$$ The $L_{n}$’s generate the conformal transformations associated to the complex variable $z=x_{1}+ix_{2}$, with the central charge $c$ labeling the conformal theory. The same algebra, with the same value of $c$, holds for the generators $\bar{L}_{n}$ of the conformal transformations in the variable $\bar{z}=x_{1}-ix_{2}$. The $L_{n}$’s commute with the $\bar{L}_{m}$’s. Each operator family consists of a primary operator $\Phi _{0}$ (which is annihilated by all the generators $L_{n}$ and $\bar{L}_{n}$ with $n>0$) and infinitely many descendant operators obtained through the repeated action on the primary of the Virasoro generators. A basis in the space of descendants is given by the operators $$L_{-i_{1}}\ldots L_{-i_{I}}\bar{L}_{-j_{1}}\ldots \bar{L}_{-j_{J}}\,\Phi _{0}
\label{descendants}$$ with $$\begin{aligned}
&&0<i_{1}\leq i_{2}\leq \ldots \leq i_{I} \\
&&0<j_{1}\leq j_{2}\leq \ldots \leq j_{J}\,.\end{aligned}$$ The levels $$(l,\bar{l})=\left( \sum_{n=1}^{I}i_{n}\,,\sum_{n=1}^{J}j_{n}\right)$$ determine the conformal dimensions of the descendants (\[descendants\]) in the form $$(\Delta ,\bar{\Delta})=(\Delta _{\Phi _{0}}+l,\bar{\Delta}_{\Phi _{0}}+\bar{l})\,.$$ In general the number of independent operators at level $(l,\bar{l})$ is $p(l)p(\bar{l})$, $p(l)$ being the number of partitions of $l$ into positive integers. This number is reduced in presence of degenerate representations associated to primary operators $\phi _{r,s}$ which possess a vanishing linear combination of descendant operators (null vector) when $l$ or $\bar{l}
$ equals $rs$.
Any conformal theory possesses a primary operator corresponding to the identity $I$ with conformal dimensions $\Delta _{I}=\bar{\Delta}_{I}=0$. All the chiral descendants $T_{s}$ and $\bar{T}_{s}$ of the identity at level $(s,0)$ and $(0,s)$, respectively, are local operators satisfying the conservation equations ($\partial \equiv \partial _{z}$, $\bar{\partial}\equiv \partial _{\bar{z}}$) $$\bar{\partial}T_{s}=0 \label{cftconservation1}$$ $$\partial \bar{T}_{s}=0 \label{cftconservation2}$$ associated to the infinite dimensional conformal symmetry. Since $L_{-1}=\partial $ and $\bar{L}_{-1}=\bar{\partial}$, the first non-vanishing chiral descendants in the identity family are $T=L_{-2}I$ and $\bar{T}=\bar{L}_{-2}I$. They coincide with the non-vanishing components of the energy-momentum tensor at criticality.
We can see a massive theory as the perturbation of a conformal theory. Considering for the sake of simplicity a single relevant perturbing operator $\varphi(x)$, we have the action $$\mathcal{A}=\mathcal{A}_{CFT}+g\int d^2x\,\varphi(x)\,. \label{action}$$
From the point of view of perturbation theory in $g$, a well defined renormalization procedure can be implemented to continue the conformal operators away from criticality [@Alyosha; @GM], with the result that the operators of the perturbed theory (\[action\]) are in one to one correspondence with those of the conformal field theory corresponding to $g=0 $ [@Taniguchi]. A source of ambiguity in the definition of the off-critical operators appears in presence of “resonances” [@Taniguchi] (see also [@FFLZZ]). An operator $\Psi $ is said to have a resonance with the operator $\Phi$ if the two operators have the same spin, $s_{\Psi}=s_\Phi$, and their scaling dimensions satisfy the condition $X_\Psi=X_\Phi+n(2-X_\varphi)$ for some positive integer $n$. In such a case the ambiguity $\Psi\rightarrow\Psi+constant\,\,g^n\Phi$ mixes two operators which at criticality are distinguished by a different scaling dimension.
The theory (\[action\]) is integrable if operators $\Theta_s(x)$ with spin $s$ exist such that the conservation equations (\[cftconservation1\]) can be deformed into the off-critical form $$\bar{\partial}T_s=\partial\Theta_{s-2} \label{conservation}$$ for an infinite set of integers $s$ which is specific of the model (similarly, (\[cftconservation2\]) acquires a total derivative with respect to $\bar{z}$ on the r.h.s.) [@Taniguchi]. Then the quantities $$Q_s=\int_{-\infty}^{+\infty}dx_1\left[T_{s+1}+\Theta_{s-1}\right] \label{qs}$$ with spin $s>0$, together with their counterparts $\bar{Q}_s$ with spin $-s$, are conserved in the massive quantum field theory. In particular, $\Theta_0\equiv\Theta\sim g\varphi$ is the trace of the energy-momentum tensor, and $Q_1=P^0+P^1$ and $\bar{Q}_1=P^0-P^1$ are the light-cone components of energy-momentum.
The existence of an infinite number of conserved quantities induces the complete elasticity and factorization of the scattering processes, and allows the exact determination of the $S$-matrix [@ZZ]. In such a framework, the operators are constructed determining their matrix elements on the asymptotic particle states. In order to avoid inessential complications of the notation we consider here the case in which the spectrum of the theory (\[action\]) possesses a single particle of mass $m\sim g^{1/(2-X_{\varphi })}$. The matrix elements (form factors) $$F_{n}^{\Phi }(\theta _{1},\ldots ,\theta _{n})=\langle 0|\Phi (0)|\theta
_{1}\ldots \theta _{n}\rangle \label{form factors}$$ of the local operator $\Phi (x)$ between the vacuum and the $n$-particle states[^1] in the integrable theory satisfy the functional equations [@KW; @Smirnov] $$\begin{aligned}
&&F_{n}^{\Phi }(\theta _{1}+\alpha ,\ldots ,\theta _{n}+\alpha )=e^{s_{\Phi
}\alpha }F_{n}^{\Phi }(\theta _{1},\ldots ,\theta _{n}) \label{fn0} \\
&&F_{n}^{\Phi }(\theta _{1},\ldots ,\theta _{i},\theta _{i+1},\ldots ,\theta
_{n})=S(\theta _{i}-\theta _{i+1})\,F_{n}^{\Phi }(\theta _{1},\ldots ,\theta
_{i+1},\theta _{i},\ldots ,\theta _{n}) \label{fn1} \\
&&F_{n}^{\Phi }(\theta _{1}+2i\pi ,\theta _{2},\ldots ,\theta
_{n})=F_{n}^{\Phi }(\theta _{2},\ldots ,\theta _{n},\theta _{1}) \label{fn3}
\\
&&\mbox{Res}_{\theta ^{\prime }=\theta }\,F_{n+2}^{\Phi }(\theta ^{\prime }+\frac{i\pi }{3},\theta -\frac{i\pi }{3},\theta _{1},\ldots ,\theta
_{n})=i\Gamma \,F_{n+1}^{\Phi }(\theta ,\theta _{1},\ldots ,\theta _{n})
\label{fn2} \\
&&\mbox{Res}_{\theta ^{\prime }=\theta +i\pi }\,F_{n+2}^{\Phi }(\theta
^{\prime },\theta ,\theta _{1},\ldots ,\theta _{n})=i\left[
1-\prod_{j=1}^{n}S(\theta -\theta _{j})\right] F_{n}^{\Phi }(\theta
_{1},\ldots ,\theta _{n})\,, \label{fn4}\end{aligned}$$ where $S(\theta )$ is the two-particle scattering amplitude, and the three-particle coupling $\Gamma $ is obtained from $$\mbox{Res}_{\theta =2i\pi /3}S(\theta )=i\Gamma ^{2}\,.$$ Of course the resonance angle in the last equation as well as in (\[fn2\]) will take more general values when spectra with particles of different masses are considered.
The equations (\[fn0\])–(\[fn4\]) do not distinguish among operators with the same spin $s_{\Phi }$. It was shown in [@immf] for reflection-positive theories that the conformal dimensions determine a quite restrictive upper bound on the asymptotic behavior of form factors at high energies. In general, it is natural to expect a relation between the asymptotic behavior and the level an operator of the massive theory belongs to in the conformal limit. Indeed, the equations (\[fn0\])–(\[fn4\]) admit “minimal solutions” characterized by the mildest asymptotic behavior, which are associated to the primary operators. The asymptotic behavior of the non-minimal solutions, which should correspond to the descendants, differs by integer powers of the momenta from that of the minimal ones (see [@ttbar]), a pattern that obviously recalls the integer spacing of levels in the conformal limit. Needless to say, the high energy limit is in fact a massless limit toward the ultraviolet conformal point.
Given a solution of the form factor equations corresponding to an operator $\Phi $, the conserved quantities $Q_{s}$ (as well as the $\bar{Q}_{s}$) can be used to generate infinitely many new independent solutions. Indeed, the commutator $[Q_{s},\Phi ]$ is the operator with conformal dimensions $(\Delta _{\Phi }+s,\bar{\Delta}_{\Phi })$ corresponding to the variation of $\Phi $ under the transformation generated by $Q_{s}$. On the other hand, the conserved quantities annihilate the vacuum and act diagonally on the asymptotic particle states as[^2] $$Q_{s}|\theta _{1},\ldots ,\theta _{n}\rangle =\Lambda _{n}^{\left( s\right)
}\left( \theta _{1},..,\theta _{n}\right) |\theta _{1},\ldots ,\theta
_{n}\rangle \label{qasymp}$$ $$\bar{Q}_{s}|\theta _{1},\ldots ,\theta _{n}\rangle =\Lambda _{n}^{\left(
-s\right) }\left( \theta _{1},..,\theta _{n}\right) |\theta _{1},\ldots
,\theta _{n}\rangle \,, \label{qbarasymp}$$ where $$\Lambda _{n}^{\left( s\right) }\left( \theta _{1},..,\theta _{n}\right)
\equiv m^{\left| s\right| }\sum_{i=1}^{n}e^{s\theta _{i}}\,.
\label{landa-functions}$$ Then, writing for simplicity from now on $Q_{s}\Phi $ instead of $[Q_{s},\Phi ]$ and $\bar{Q}_{s}\Phi $ instead of $[\bar{Q}_{s},\Phi ]$, we have $$\begin{aligned}
&&F_{n}^{Q_{s}\Phi }(\theta _{1},\ldots ,\theta _{n})=-\Lambda _{n}^{\left(
s\right) }\left( \theta _{1},..,\theta _{n}\right) F_{n}^{\Phi }(\theta
_{1},\ldots ,\theta _{n}) \label{ccc-descendant-form-factors-a} \\
&&F_{n}^{\bar{Q}_{s}\Phi }(\theta _{1},\ldots ,\theta _{n})=-\Lambda
_{n}^{\left( -s\right) }\left( \theta _{1},..,\theta _{n}\right) F_{n}^{\Phi
}(\theta _{1},\ldots ,\theta _{n})\,. \label{ccc-descendant-form-factors-b}\end{aligned}$$ It is straightforward to check that these expressions satisfy the general form factor equations (\[fn0\])–(\[fn3\]) for operators with spin $s_{\Phi }+s$ and $s_{\Phi }-s$, respectively. Equation (\[fn4\]) leads to the condition $$e^{s\theta }+e^{s(\theta +i\pi )}=0\,,$$ showing that the values of the spin $s$ of the conserved quantities need to be odd. Finally, if $\Gamma \neq 0$, equation (\[fn2\]) gives the condition $$e^{is\pi /3}+e^{-is\pi /3}=1\,,$$ showing that, in a theory with a single particle $A$ in the spectrum and admitting the fusion $AA\rightarrow A$, the allowed values for the spin of the conserved quantities are $$s=6n\pm 1\,,\hspace{1cm}n=0,\pm 1,\pm 2\ldots \,\,. \label{spins}$$
\[gamma-2\]The Lee-Yang model
=============================
Critical point
--------------
The Lee-Yang model is the quantum field theory associated to the edge singularity of the zeros of the partition function of the Ising model in an imaginary magnetic field [@YL; @LY; @Fisher]. The critical point is described by the simplest conformal field theory [@Cardy], i.e. the minimal model $\mathcal{M}_{2,5}$, with central charge $c=-22/5$, possessing only two local primary operators: the identity $I=\phi_{1,1}=\phi_{1,4}$ with conformal dimensions $(0,0)$, and the operator $\varphi=\phi_{1,2}=\phi_{1,3}$ with conformal dimensions $(-1/5,-1/5)$. The negative values of the central charge and of $X_\varphi$ show that the model does not satisfy reflection-positivity.
The degenerate nature of the primary fields reduces the dimensionality of the space of the level $(l,\bar{l})$ descendants of the primary $\phi $ to $d_{\phi }(l)d_{\phi }(\bar{l})$, with $d_{\phi }(n)$ generated by the rescaled character $$\chi _{\phi }(q)=\sum_{n=0}^{\infty }d_{\phi }(n)q^{n}\,.$$ The two characters for the Lee-Yang model are [@Feigen-Fuchs; @R-C; @Christe] $$\chi _{I}(q)=\prod_{n=0}^{\infty }\frac{1}{\left( 1-q^{2+5n}\right) \left(
1-q^{3+5n}\right) }$$ $$\chi _{\varphi }(q)=\prod_{n=0}^{\infty }\frac{1}{\left( 1-q^{1+5n}\right)
\left( 1-q^{4+5n}\right) }\,.$$ The dimensionalities of the first few levels can then be read from the expansions $$\chi _{I}(q)=1\hspace{0.02in}+q^{2}+q^{3}\hspace{0.02in}+\hspace{0.02in}q^{4}\hspace{0.02in}+\hspace{0.02in}q^{5}\hspace{0.02in}+\hspace{0.02in}2q^{6}+\hspace{0.02in}2q^{7}+\hspace{0.02in}3q^{8}+O(q^{9})$$ $$\chi _{\varphi
}(q)=1+q+q^{2}+q^{3}+2q^{4}+2q^{5}+3q^{6}+3q^{7}+4q^{8}+O(q^{9})\,.$$ A basis for the chiral descendants up to level 7 is given in table 1.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
$\text{Level of the descendant}$ $\hspace{0.1in}I$ $\hspace{0.1in}\varphi $
------------------------------------- ------------------------------------------------------- ---------------------------------------------------------------------------------------------
$\left( 1,0\right) $ $\hspace{0.1in}0$ $\hspace{0.1in}\partial \varphi $
$\left( 2,0\right) $ $\hspace{0.1in}T$ $\hspace{0.1in}\partial ^{2}\varphi $
$\left( 3,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{3}\varphi $
T$
$\left( 4,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{4}\varphi \hspace{0.05in};\hspace{0.05in}L_{-4}\varphi $
^{2}T$
$\left( 5,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{5}\varphi \hspace{0.05in};\hspace{0.05in}\partial L_{-4}\varphi $
^{3}T$
$\left( 6,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial
^{4}T\hspace{0.05in};\hspace{0.05in}L_{-4}T$ ^{6}\varphi \hspace{0.05in};\hspace{0.05in}\partial ^{2}L_{-4}\varphi
\hspace{0.05in};\hspace{0.05in}L_{-6}\varphi $
$\left( 7,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{7}\varphi \hspace{0.05in};\hspace{0.05in}\partial
^{5}T\hspace{0.05in};\hspace{0.05in}\partial L_{-4}T$ ^{3}L_{-4}\varphi \hspace{0.05in};\hspace{0.05in}\partial L_{-6}\varphi $
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
: Basis for the left chiral descendants of the two primary fields in the Lee-Yang model up to level 7 in terms of Virasoro generators. The corresponding basis for the right descendants is obtained changing $\partial
$, $L_{-n}$ and $T$ into $\bar{\partial}$, $\bar{L}_{-n}$ and $\bar{T}$, respectively.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
$\text{Level of the descendant}$ $\hspace{0.1in}I$ $\hspace{0.1in}\varphi $
------------------------------------- --------------------------------------------- --------------------------------------------------------------------------------------------------------------------
$\left( 1,0\right) $ $\hspace{0.1in}0$ $\hspace{0.1in}\partial \varphi $
$\left( 2,0\right) $ $\hspace{0.1in}T$ $\hspace{0.1in}\partial ^{2}\varphi $
$\left( 3,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{3}\varphi $
T$
$\left( 4,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{4}\varphi \hspace{0.05in};\hspace{0.05in}R_{4}\varphi $
^{2}T$
$\left( 5,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial ^{5}\varphi \hspace{0.05in};\hspace{0.05in}Q_{5}\varphi $
^{3}T$
$\left( 6,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial
^{4}T\hspace{0.05in};\hspace{0.05in}S_{4}T$ ^{6}\varphi \hspace{0.05in};\hspace{0.05in}\partial Q_{5}\varphi \hspace{0.05in};\hspace{0.05in}R_{6}\varphi $
$\left( 7,0\right) $ $\hspace{0.1in}\partial $\hspace{0.1in}\partial
^{5}T\hspace{0.05in};\hspace{0.05in}Q_{5}T$ ^{7}\varphi \hspace{0.05in};\hspace{0.05in}\partial ^{2}Q_{5}\varphi \hspace{0.05in};\hspace{0.05in}Q_{7}\varphi $
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
: Basis for the left chiral descendants of the two primary fields in the Lee-Yang model up to level 7 exploiting the conserved quantities. An analogous basis exists for the right chiral descendants.
At the conformal point the conserved quantities $Q_{s}$ are combinations of the Virasoro generators $L_{n}$ with dimensions $(s,0)$, while the $\bar{Q}_{s}$ are combinations of the $\bar{L}_{n}$ with dimensions $(0,s)$. However, since $Q_s$ and $\bar{Q}_s$ are conserved in the massive theory and act diagonally on the particle states, they are much more convenient than the Virasoro generators for labeling the descendant operators in view of the off-critical continuation. This is why we exploit the existence of conserved quantities with spin $5$ and $7$ in the Lee-Yang model to switch from the basis of table 1 to that given in table 2. Here the descendant operators $S_{4}T$, $R_{4}\varphi $ and $R_{6}\varphi $ are defined through the relations $$\begin{aligned}
&&Q_{5}T=\partial S_{4}T \label{i6} \\
&&Q_{5}\varphi =\partial R_{4}\varphi \label{r4} \\
&&Q_{7}\varphi =\partial R_{6}\varphi \,\,. \label{r6}\end{aligned}$$ The descendant operators $\bar{S}_{4}\bar{T}$, $\bar{R}_{4}\varphi $ and $\bar{R}_{6}\varphi $ defined through the relations $$\begin{aligned}
&&\bar{Q}_{5}\bar{T}=\bar{\partial}\bar{S}_{4}\bar{T} \label{sb4} \\
&&\bar{Q}_{5}\varphi =\bar{\partial}\bar{R}_{4}\varphi \label{rb4} \\
&&\bar{Q}_{7}\varphi =\bar{\partial}\bar{R}_{6}\varphi \label{bar6}\end{aligned}$$ appear in the right chiral basis.
The linear independence between $\partial ^{5}T$ and $Q_{5}T$ ensures that we can write $Q_{5}T\sim \partial ^{5}T+a\partial L_{-4}T$, with $a\neq 0$. Then (\[i6\]) ensures that $S_{4}T$ contains a non-vanishing component of $L_{-4}T$. Similar considerations apply to the other operators we have defined through (\[i6\])–(\[bar6\]). Then we write $$\begin{aligned}
&S_{4}\sim \partial ^{4}+aL_{-4}\,,&\bar{S}_{4}\sim \bar{\partial}^{4}+a\bar{L}_{-4} \\
&R_{4}\sim \partial ^{4}+bL_{-4}\,,&\bar{R}_{4}\sim \bar{\partial}^{4}+b\bar{L}_{-4} \\
&R_{6}\sim \partial ^{6}+c\partial ^{2}L_{-4}+dL_{-6}\,,\hspace{1cm}&\bar{R}_{6}\sim \bar{\partial}^{6}+c\bar{\partial}^{2}L_{-4}+d\bar{L}_{-6}\,,\end{aligned}$$ with $a$, $b$ and $d$ different from zero.
Scaling limit
-------------
The off-critical Lee-Yang model is obtained perturbing the conformal field theory $\mathcal{M}_{2,5}$ with the primary operator $\varphi $, which is the only non-trivial relevant operator in the theory. The massive model is integrable as a consequence of the general results of [@Taniguchi] about perturbed conformal field theories. The mass spectrum contains only one particle $A$ and the exact on-shell solution is provided by the $S$-matrix [@CMyanglee] $$S(\theta )=\frac{\tanh \frac{1}{2}\left( \theta +\frac{2i\pi }{3}\right) }{\tanh \frac{1}{2}\left( \theta -\frac{2i\pi }{3}\right) }\,, \label{s}$$ where $\theta $ is the rapidity difference of the two colliding particles. The bound state pole located at $\theta =2i\pi /3$ implies the fusion property $AA\rightarrow A$, so that the model possesses conserved quantities with the spins given in (\[spins\]).
The trace of the energy-momentum tensor $\Theta =T_{\mu }^{\mu }/4$ is proportional to the perturbing operator $\varphi $ and from now on we refer to $\Theta $ instead of $\varphi $ in the off-critical theory. The form factors of $\Theta $ were determined in [@Smirnovreduction; @Alyosha] (see also [@Koubek]) and can be written as $$F_{n}^{\Theta }(\theta _{1},\ldots ,\theta _{n})=U_{n}^{\Theta }(\theta
_{1},\ldots ,\theta _{n})\prod_{i<j}\frac{F_{min}(\theta _{i}-\theta _{j})}{\cosh \frac{\theta _{i}-\theta _{j}}{2}\left[ \cosh (\theta _{i}-\theta
_{j})+\frac{1}{2}\right] }\text{.} \label{fn}$$ Here the factors in the denominator introduce the bound state and annihilation poles prescribed by (\[fn2\]) and (\[fn4\]), while $$F_{min}(\theta )=-i\sinh \frac{\theta }{2}\,\exp \left\{ 2\int_{0}^{\infty }\frac{dt}{t}\frac{\cosh \frac{t}{6}}{\cosh \frac{t}{2}\sinh t}\sin ^{2}\frac{(i\pi -\theta )t}{2\pi }\right\} \label{fmin}$$ is a solution of the equations $$F(\theta )=S(\theta )F(-\theta )$$ $$F(\theta +2i\pi )=F(-\theta )$$ free of zeros and poles for Im$\theta \in (0,2\pi )$ and behaving as $$F_{min}(\theta )\sim e^{|\theta |} \label{asyp-fmin}$$ when $|\theta |\rightarrow \infty $. Finally, $U_{n}^{\Theta }(\theta
_{1},\ldots ,\theta _{n})$ are the following entire functions of the rapidities, symmetric and (up to a factor $(-1)^{n-1}$) $2\pi i$-periodic in all $\theta _{j}$’s: $$U_{n}^{\Theta }\left( \theta _{1},..,\theta _{n}\right) =H_{n}\left( \frac{1}{\sigma _{n}^{(n)}}\right) ^{\left( n-1\right) /2}Q_{n}^{\Theta }\left(
\theta _{1},..,\theta _{n}\right) \,. \label{un}$$ Here $\sigma _{i}^{(n)}$ are the elementary symmetric polynomials generated by $$\prod_{i=1}^{n}(x+x_{i})=\sum_{k=0}^{n}x^{n-k}\sigma _{k}^{(n)}(x_{1},\ldots
,x_{n})\text{,}$$ with $x_{i}\equiv e^{\theta _{i}}$, $H_{n}=i^{n^{2}}\left( 3/4\right)
^{n/4}\gamma ^{n\left( n-2\right) }$, $$\gamma =\exp \left\{ 2\int_{0}^{\infty }\frac{dt}{t}\,\frac{\sinh \frac{t}{2}\sinh \frac{t}{3}\sinh \frac{t}{6}}{\sinh ^{2}t}\right\} \,,$$ and $Q_{n}^{\Theta }(\theta _{1},\ldots ,\theta _{n})$ is the determinant $$Q_{n}^{\Theta }(\theta _{1},\ldots ,\theta _{n})=-\frac{\pi m^{2}}{4\sqrt{3}}\,det\left\| M_{i,j}^{(n)}\right\| \label{thetan}$$ of the $(n-1)\times (n-1)$ matrix with entries $$M_{i,j}^{(n)}=\frac{\sin (2(i-j+1)\frac{\pi }{3})}{\sin \frac{2\pi }{3}}\,\sigma _{2i-j}^{(n)}\,.$$
The conservation equations $$\bar{\partial}T=\partial \Theta \,,\hspace{0.3in}\partial \bar{T}=\bar{\partial}\Theta$$ allow the determination of the form factors of the other components of the energy-momentum tensor in the form $$\begin{aligned}
&&F_{n}^{T}(\theta _{1},\ldots ,\theta _{n})=-\frac{\sigma _{n}^{(n)}\sigma
_{1}^{(n)}}{\sigma _{n-1}^{(n)}}\,F_{n}^{\Theta }(\theta _{1},\ldots ,\theta
_{n}) \label{T-descendant} \\
&&F_{n}^{\bar{T}}(\theta _{1},\ldots ,\theta _{n})=-\,\frac{\sigma
_{n-1}^{(n)}}{\sigma _{1}^{(n)}\sigma _{n}^{(n)}}F_{n}^{\Theta }(\theta
_{1},\ldots ,\theta _{n}) \label{Tbar-descendant}\end{aligned}$$ for $n>0$. Of course $\langle T\rangle =\langle \bar{T}\rangle =0$ as for any operator with non-zero spin. The factors in the denominator of the last two equations do not introduce unwanted singularities since the functions $Q_{n}^{\Theta }$ have the property of factorizing $\sigma _{1}^{(n)}$ and $\sigma _{n-1}^{(n)}$, respectively the eigenvalues[^3] of $\partial $ and $\bar{\partial}$ on the $n$-particle asymptotic states.
Off-critical descendants from conservation laws
===============================================
In this section we show how the form factors of all the descendant operators in the massive Lee-Yang model up to level 7 can be obtained starting from the known solutions for $\Theta$, $T$, $\bar{T}$ and $T\bar{T}$ exploiting the conserved quantities of the integrable model.
All the solutions we find in this way automatically satisfy the following asymptotic properties that we conjecture to hold for all the operators of the theory[^4]:
i\) the form factors of a level $(l,\bar{l})$ non-chiral descendant $\Phi
_{(l,\bar{l})}$ of the primary $\Phi _{0}$ are homogeneous functions, with respect to the variables $x_{i}\equiv e^{\theta _{i}}$, of degree $l-\bar{l}$ (eq. (\[fn0\])), furthermore behaving as $$F_{n}^{\Phi _{(l,\bar{l})}}\left( \theta _{1}+\alpha ,..,\theta _{k}+\alpha
,\theta _{k+1},...,\theta _{n}\right) \sim e^{l\alpha }
\label{level-descendant}$$ for $\alpha\rightarrow +\infty$, $n>1\hspace{0.08in}$and$\hspace{0.08in}1\leq k\leq n-1$. This equation holds also for the chiral descendants of $\Theta $, while the chiral descendants of $I$ of level $\left( l,0\right) $ and $(0,\bar{l})$ have form factors with homogeneous degree $l$ and $-\bar{l}
$, respectively, and behave as $$F_{n}^{I_{\left( l,0\right) }}\left( \theta _{1}+\alpha ,..,\theta
_{k}+\alpha ,\theta _{k+1},...,\theta _{n}\right) \sim e^{\left( l-1\right)
\alpha }\,,\hspace{0.08in}F_{n}^{I_{(0,\bar{l})}}\left( \theta _{1}+\alpha
,..,\theta _{k}+\alpha ,\theta _{l+1},...,\theta _{n}\right) \sim e^{-\alpha
} \label{chiral-descendants-Identity}$$ for $\alpha\rightarrow +\infty$, $n>1\hspace{0.08in}$and$\hspace{0.08in}1\leq k\leq n-1$;
ii\) let us denote by $\mathcal{L}_{l}\bar{\mathcal{L}}_{\bar{l}}\Phi _{0}$ a level $(l,\bar{l})$ descendant which in the critical limit assumes the form (\[descendants\]) with $\mathcal{L}_{l}$ ($\bar{\mathcal{L}}_{\bar{l}}$) accounting for the product of $L_{-i}$ ($\bar{L}_{-j}$). Then the factorization property $$\lim_{\alpha \rightarrow +\infty }e^{-l\alpha }F_{n}^{\mathcal{L}_{l}\bar{\mathcal{L}}_{\bar{l}}\Phi _{0}}\left( \theta _{1}+\alpha ,..,\theta
_{k}+\alpha ,\theta _{k+1},..,\theta _{n}\right) =\frac{1}{\left\langle \Phi
_{0}\right\rangle }F_{k}^{\mathcal{L}_{l}\Phi _{0}}\left( \theta
_{1},..,\theta _{k}\right) F_{n-k}^{\bar{\mathcal{L}}_{\bar{l}}\Phi
_{0}}\left( \theta _{k+1},..,\theta _{n}\right) \label{Conjecture-2}$$ holds for $k=0,1,\ldots ,n$.
Descendants of $\Theta$
-----------------------
The form factors of the descendants of $\Theta $ obtained acting on the primary with the conserved quantities are defined without ambiguity by $\left( \ref{ccc-descendant-form-factors-a}\right) $ and $\left( \ref
{ccc-descendant-form-factors-b}\right) $. Then we are left with the problem of fixing the form factors of the operators obtained acting on $\Theta $ with $R_{4}$ , $R_{6}$ and their negative spin counterparts. We know from (\[r4\]), (\[r6\]), (\[rb4\]) and (\[bar6\]) that at criticality these operators differ by derivatives from operators obtained through the action of conserved quantities. Since the form factors of $\Theta $ factorize the eigenvalues of $\partial \bar{\partial}$, this property is automatically satisfied also in the massive theory. Indeed, stripping off in each case the appropriate derivative eigenvalue we can write $$\begin{array}{l}
\begin{tabular}{ll}
$\overset{}{F_{n}^{R_{4}\Theta }=\left( im\sigma _{1}^{(n)}\right)
^{-1}F_{n}^{Q_{5}\Theta }},$ & \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ $\overset{}{F_{n}^{\bar{R}_{4}\Theta }=\left( -im\bar{\sigma}_{1}^{(n)}\right)
^{-1}F_{n}^{\bar{Q}_{5}\Theta }}$\end{tabular}
\\
\\
\begin{tabular}{ll}
$\overset{}{F_{n}^{R_{6}\Theta }=\left( im\sigma _{1}^{(n)}\right)
^{-1}F_{n}^{Q_{7}\Theta }},$ & \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ $\overset{}{F_{n}^{\bar{R}_{6}\Theta }=\left( -im\bar{\sigma}_{1}^{(n)}\right)
^{-1}F_{n}^{\bar{Q}_{7}\Theta }}\,$\end{tabular}
\\
\\
\begin{tabular}{ll}
$\overset{}{F_{n}^{R_{4}\bar{R}_{4}\Theta }=\left( m^{2}\sigma _{1}^{(n)}\bar{\sigma}_{1}^{(n)}\right) ^{-1}F_{n}^{Q_{5}\bar{Q}_{5}\Theta }},$ & $\overset{}{\ \ \ \ \ \ F_{n}^{R_{4}\bar{R}_{6}\Theta }=\left( m^{2}\sigma
_{1}^{(n)}\bar{\sigma}_{1}^{(n)}\right) ^{-1}F_{n}^{Q_{5}\bar{Q}_{7}\Theta }}
$\end{tabular}
\\
\\
\begin{tabular}{ll}
$\overset{}{F_{n}^{R_{6}\bar{R}_{6}\Theta }=\left( m^{2}\sigma _{1}^{(n)}\bar{\sigma}_{1}^{(n)}\right) ^{-1}F_{n}^{Q_{7}\bar{Q}_{7}\Theta }},$ & \ \
\ \ \ \ $\overset{}{F_{n}^{R_{6}\bar{R}_{4}\Theta }=\left( m^{2}\sigma
_{1}^{(n)}\bar{\sigma}_{1}^{(n)}\right) ^{-1}F_{n}^{Q_{7}\bar{Q}_{5}\Theta }.}$\end{tabular}
\end{array}$$
The form factors of $\Theta $ given in the previous section satisfy the asymptotic factorization property ($k=0,1,\ldots ,n$) $$\lim_{\alpha \rightarrow +\infty }F_{n}^{\Theta }\left( \theta _{1}+\alpha
,..,\theta _{k}+\alpha ,\theta _{k+1},..,\theta _{n}\right) =\frac{1}{\langle \Theta \rangle }F_{k}^{\Theta }(\theta _{1},..,\theta
_{k})F_{n-k}^{\Theta }\left( \theta _{k+1},..,\theta _{n}\right)
\label{clustertheta}$$ discussed in [@DSC], with $$\langle \Theta \rangle=F_{0}^{\Theta }=-\frac{\pi m^{2}}{4\sqrt{3}}\,.
\label{vevtheta}$$ This value of the vacuum expectation value was originally obtained in [@TBA] using the thermodynamic Bethe ansatz.
The factorization properties of the eigenvalues of the conserved quantities given in appendix B then ensure that the solutions determined above satisfy (\[Conjecture-2\]) with $\Phi _{0}=\Theta $. This in turn implies the asymptotic behavior (\[level-descendant\]).
Descendants of the identity
---------------------------
The matrix elements of the chiral descendants of $I$ obtained through conserved charges are again fixed by $\left( \ref
{ccc-descendant-form-factors-a}\right) $ and $\left( \ref
{ccc-descendant-form-factors-b}\right) $ together with the solution for $T$ and $\bar{T}$ given in the previous section. Concerning the remaining chiral operators $S_{4}T$ and $\bar{S}_{4}\bar{T}$, we observe that the form factors of $T$ and $\bar{T}$ factorize the eigenvalues of $\partial ^{2}$ and $\bar{\partial}^{2}$, respectively. We can then exploit (\[i6\]) and (\[sb4\]) to write $$F_{n}^{S_{4}T}=\left( im\sigma _{1}^{(n)}\right) ^{-1}F_{n}^{Q_{5}T}\text{ \
},\text{ \ }F_{n}^{\bar{S}_{4}\bar{T}}=\left( -im\bar{\sigma}_{1}^{(n)}\right) ^{-1}F_{n}^{\bar{Q}_{5}\bar{T}}\,.$$
We can now turn to the problem of identifying the off-critical continuation of the non-chiral descendants of $I$. The first of such operators is $T\bar{T}$. It was shown in [@Sasha] that this operator can be conveniently defined away from criticality as $$T\bar{T}(x)=\lim_{x^{\prime }\rightarrow x}[T(x)\bar{T}(x^{\prime })-\mathcal{R}_{T\bar{T}}(x,x^{\prime })]\,\text{,} \label{regularized}$$ where $$\mathcal{R}_{T\bar{T}}(x,x^{\prime })=\Theta (x)\Theta (x^{\prime })+\mbox{derivative terms} \label{regttbar}$$ regularizes the divergences arising in the limit away from criticality. The matrix elements of $T\bar{T}$ in the Lee-Yang model have been identified in [@ttbar] and read $$F_{n}^{T\bar{T}}=\frac{\langle \Theta \rangle }{m^{4}}\,F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }+\langle \Theta \rangle
^{2}\,F_{n}^{K_{3}}-2\,\langle \Theta \rangle F_{n}^{\Theta }+\langle \Theta
\rangle ^{2}\,\,\delta _{n,0}+c\,F_{n}^{\partial \bar{\partial}\Theta }\,.
\label{fnttbar}$$ The kernel solution (see next section) $F_{n}^{{K}_{3}}$ is given explicitly in [@ttbar] up to $n=9$. The operator $\partial \bar{\partial}\Theta $ is resonant with $T\bar{T}$, so that the coefficient $c$ in (\[fnttbar\]) is intrinsically ambiguous.
Going to higher non-chiral descendants of the identity, consider those operators which are obtained as regularized products of conserved quantities acting on $T$ and $\bar{T}$. It is shown in appendix A that the subtraction which regularizes the operator (\[regularized\]) regularizes also these composite operators. We exploit, however, the possibility of adding resonant terms $\rho _{k}$, and write $$Q_{s}\bar{Q}_{r}T\bar{T}(x)=Q_{s}\bar{Q}_{r}\left( T\bar{T}\right)
(x)+\sum_{k}c_{k}\rho _{k}(x)\,, \label{ccc-descendant-ttbar}$$ or in terms of form factors, $$F_{n}^{Q_{s}\bar{Q}_{r}T\bar{T}}=\Lambda _{n}^{\left( s\right) }\Lambda
_{n}^{\left( -r\right) }F_{n}^{T\bar{T}}+\sum_{k}c_{k}F_{n}^{\rho _{k}}\,.
\label{form factors-ccc-descendant-ttbar}$$ The role of the resonances is the following. We know from table 2 and equations (\[i6\])-(\[bar6\]) that at criticality some of the operators we are considering are derivatives of operators living one level below. We expect this property to continue to hold in the massive theory and have seen how this is automatically achieved for the descendants of $\Theta $ and the chiral descendants of $I$. Concerning the non-chiral descendants of $I$, the form factor solution for $T\bar{T}$ does not factorize any derivative eigenvalue (see [@ttbar]), and this property is not guaranteed a priori. Remarkably, however, it can be recovered by fine tuning the coefficients of some of the resonant terms in the last equation.
To see this, observe first that, since $T\bar{T}$ and $\Theta $ have conformal dimensions $(2,2)$ and $(1,1)$, respectively, the level $(p,q)$ descendant of $I$ is resonant with the level $(p-1,q-1)$ descendants of $\Theta $ for $p$ and $q$ larger than 1. Letting aside for the time being the operators containing $S_{4}$ and $\bar{S}_{4}$, for $p$ and $q$ less than 7 the above requirement only forces the coefficients of resonances like $R_{4}\bar{\partial}\Theta $, $\partial \bar{R}_{4}\Theta $ and $R_{4}\bar{R}_{4}\Theta $ (which do not contain the required derivative terms) to vanish.
A more interesting situation arises when considering the descendants of $I$ containing $Q_{5}$ or $\bar{Q}_{5}$ acting on $T\bar{T}$. At level $(7,2)$ we have two operators, $Q_{5}T\bar{T}$ and $\partial ^{5}T\bar{T}$, which away from criticality are resonant with the space of level $(6,1)$ descendants of $\Theta $ spanned by $Q_{5}\partial \bar{\partial}\Theta $, $\partial ^{6}\bar{\partial}\Theta $ and $R_{6}\bar{\partial}\Theta $. The latter operator, with form factors $$F_{n}^{R_{6}\bar{\partial}\Theta }=\frac{\bar{\sigma}_{1}^{(n)}}{\sigma
_{1}^{(n)}}\Lambda _{n}^{\left( 7\right) }F_{n}^{\Theta }\,,$$ is the only one among the resonant operators which does not contain a derivative with respect to $z$. The requirement that also away from criticality the operators $Q_{5}T\bar{T}$ and $\partial ^{5}T\bar{T}$ are derivatives with respect to $z$ of the two level $(6,2)$ descendants of $I$ is satisfied with the following unique choice of the coefficients of $R_{6}\bar{\partial}\Theta $ $$\begin{aligned}
&&\partial ^{5}T\bar{T}(x)=\partial ^{5}\left( T\bar{T}\right) (x)
\label{t5} \\
&&Q_{5}T\bar{T}(x)=Q_{5}\left( T\bar{T}\right) (x)-\frac{5}{7}R_{6}\bar{\partial}\Theta (x)\,. \label{Q5-ttbar}\end{aligned}$$ Notice that, since the composite operator $T\bar{T}$ already includes the resonant term $\partial \bar{\partial}\Theta $ in its definition (see (\[fnttbar\])), the resonances $Q_{5}\partial \bar{\partial}\Theta $ and $\partial ^{6}\bar{\partial}\Theta $ are automatically included in the space spanned by (\[t5\]) and (\[Q5-ttbar\]). The same analysis gives $$\begin{aligned}
&&\bar{\partial}^{5}T\bar{T}(x)=\bar{\partial}^{5}\left( T\bar{T}\right) (x)
\\
&&\bar{Q}_{5}T\bar{T}(x)=\bar{Q}_{5}\left( T\bar{T}\right) (x)-\frac{5}{7}\partial \bar{R}_{6}\Theta (x)\end{aligned}$$ at level $(2,7)$, and $$\begin{aligned}
&&\partial ^{5}\bar{\partial}^{5}T\bar{T}(x)=\partial ^{5}\bar{\partial}^{5}\left( T\bar{T}\right) (x) \label{Q5-Q5bar-ttbar} \\
&&Q_{5}\bar{Q}_{5}T\bar{T}(x)=Q_{5}\bar{Q}_{5}\left( T\bar{T}\right) (x)-\frac{5}{7}R_{6}\bar{\partial}\bar{Q}_{5}\Theta (x)-\frac{5}{7}\partial Q_{5}\bar{R}_{6}\Theta (x) \\
&&\partial ^{5}\bar{Q}_{5}T\bar{T}(x)=\partial ^{5}\bar{Q}_{5}\left( T\bar{T}\right) (x)-\frac{5}{7}\partial ^{6}\bar{R}_{6}\Theta (x) \\
&&\bar{\partial}^{5}Q_{5}T\bar{T}(x)=\bar{\partial}^{5}Q_{5}\left( T\bar{T}\right) (x)-\frac{5}{7}R_{6}\bar{\partial}^{6}\Theta (x) \label{qt5}\end{aligned}$$ at level $(7,7)$.
We are now in the position of dealing straightforwardly with the operators $S_{4}T\bar{T}$, $\bar{S}_{4}T\bar{T}$ and $S_{4}\bar{S}_{4}T\bar{T}$. Indeed, the construction above ensures that the equations $$Q_{5}T\bar{T}=\partial S_{4}T\bar{T}\hspace{0.1in};\hspace{0.1in}\bar{Q}_{5}T\bar{T}=\bar{\partial}\bar{S}_{4}T\bar{T}\hspace{0.1in};\hspace{0.1in}Q_{5}\bar{Q}_{5}T\bar{T}=\partial \bar{\partial}S_{4}\bar{S}_{4}T\bar{T}
\label{s4}$$ hold also away from criticality, so that we can write the form factors $$\begin{aligned}
& F_{n}^{S_{4}T\bar{T}}=\left( -im\sigma _{1}^{(n)}\right) ^{-1}\left(
\Lambda _{n}^{\left( 5\right) }F_{n}^{T\bar{T}}+\frac{5}{7}\frac{\bar{\sigma}_{1}^{(n)}}{\sigma _{1}^{(n)}}\Lambda _{n}^{\left( 7\right) }F_{n}^{\Theta
}\right) \\
& \notag \\
& F_{n}^{\bar{S}_{4}T\bar{T}}=\left( im\bar{\sigma}_{1}^{(n)}\right)
^{-1}\left( \Lambda _{n}^{\left( -5\right) }F_{n}^{T\bar{T}}+\frac{5}{7}\frac{\sigma _{1}^{(n)}}{\bar{\sigma}_{1}^{(n)}}\Lambda _{n}^{\left(
-7\right) }F_{n}^{\Theta }\right) \\
& \notag \\
& F_{n}^{S_{4}\bar{S}_{4}T\bar{T}}=\left( m^{2}\sigma _{1}^{(n)}\bar{\sigma}_{1}^{(n)}\right) ^{-1}\left( \Lambda _{n}^{\left( 5\right) }\Lambda
_{n}^{\left( -5\right) }F_{n}^{T\bar{T}}+\frac{5}{7}\frac{\bar{\sigma}_{1}^{(n)}}{\sigma _{1}^{(n)}}\Lambda _{n}^{\left( 7\right) }\Lambda
_{n}^{\left( -5\right) }F_{n}^{\Theta }+\frac{5}{7}\frac{\sigma _{1}^{(n)}}{\bar{\sigma}_{1}^{(n)}}\Lambda _{n}^{\left( -7\right) }\Lambda _{n}^{\left(
5\right) }F_{n}^{\Theta }\right) \,.\end{aligned}$$
Since all the non-chiral descendants of the identity up to level 7 can be obtained taking derivatives of the operators $T\bar{T}$, $S_{4}T\bar{T}$, $\bar{S}_{4}T\bar{T}$ and $S_{4}\bar{S}_{4}T\bar{T}$, our discussion is now complete.
The factorization properties of the eigenvalues of the conserved quantities together with (\[T-descendant\]), (\[Tbar-descendant\]), (\[clustertheta\]) and $$\lim_{\alpha \rightarrow +\infty }e^{-2\alpha }F_{n}^{T\bar{T}}\left( \theta
_{1}+\alpha ,..,\theta _{k}+\alpha ,\theta _{k+1},..,\theta _{n}\right)
=F_{k}^{T}\left( \theta _{1},..,\theta _{k}\right) F_{n-k}^{\bar{T}}\left(
\theta _{k+1},..,\theta _{n}\right) \label{clusterttbar}$$ ($k=0,1,\ldots ,n$) imply that the form factors of the descendants of the identity we determined satisfy (\[Conjecture-2\]) with $\Phi _{0}=I$. In particular, the chiral and non-chiral descendant satisfy the asymptotic behavior (\[chiral-descendants-Identity\]) and (\[level-descendant\]), respectively.
Comparison with the form factor bootstrap
=========================================
In the previous section we used the conserved quantities to construct, starting from the form factor solutions for the energy-momentum tensor and $T\bar{T}$, all the operators in the massive Lee-Yang model as expected from the conformal structure of the operator space, level by level up to level 7. In this section we want to show that exactly the same operator space is generated by the solutions of the form factor bootstrap equations (\[fn0\])-(\[fn4\]) supplemented by the level-dependent specification (\[level-descendant\]) on the asymptotic behavior. We do this explicitly for the scalar operators of level $(l,l)$ up to $l=7$, thus generalizing what had been done in [@ttbar] for $l\leq 2$.
An essential role in this analysis is played by the so-called kernel solutions. We call minimal scalar $N$-particle kernel the solution $$F_{N}^{K_{N}}(\theta _{1},...,\theta _{N})=2^{N(N-1)}H_{N}\prod_{1\leq
i<j\leq N}F_{min}(\theta _{i}-\theta _{j}) \label{N-kernel}$$ of the form factor equations (\[fn0\])–(\[fn4\]) with $s_\Phi=0$, $n=N$ and zero on the r.h.s. of (\[fn2\]) and (\[fn4\]). This kernel is minimal in the sense that it has the mildest asymptotic behavior for large rapidities. The other scalar $N$-particle kernels are given by $$U_{N}\left( \theta _{1},..,\theta _{N}\right) F_{N}^{K_{N}}(\theta
_{1},...,\theta _{N})\,, \label{N-kernels}$$ where $U_{N}\left( \theta _{1},..,\theta _{N}\right) $ is a scalar entire function of the rapidities, symmetric and (up to a factor $(-1)^{N-1}$) $2\pi i$-periodic in all $\theta _{j}$’s. We call $N$-particle kernel solution the solution $F^{U_NF_N}_n$ of the form factor equations having (\[N-kernels\]) as initial condition ($F^{U_NF_N}_n=0$ for $n<N$ and the $M$-particle kernel solutions arising for $M>N$ are ignored).
It follows from (\[asyp-fmin\]) that $$F_{N}^{K_{N}}\left( \theta _{1}+\alpha ,..,\theta _{k}+\alpha ,\theta
_{k+1},...,\theta _{n}\right) \sim e^{k(N-k)\alpha },
\label{asymptotic-N-kernel}$$ for $\alpha\rightarrow +\infty$, $N>1$ and $1\leq k\leq N-1$. So, the maximal asymptotic behavior of $F_{N}^{K_{N}}$ is $e^{d_{K_{N}}\alpha }$ with $d_{K_{2M}}=M^{2}$ and $d_{K_{2M+1}}=(M+1)M$. Similarly, if $e^{d_{U_NK_N}}$ is the maximal asymptotic behavior of (\[N-kernels\]), we know that $d_{U_NK_N}\geq d_{K_N}$. On the other hand, it is implied by $\left( \ref{level-descendant}\right) $ that $U_{N}F_{N}^{K_{N}}$ can contribute to the form factor solutions of operators of level $(l,l)$ if and only if $d_{U_{N}K_{N}}=l$. Since $d_{K_N}>7$ for $N>5$, our analysis for $l\leq 7$ can involve only $N$-particle kernel solutions with $N\leq 5$.
In table 3 we list, for each level up to $(7,7)$, all the independent scalar solutions of the form factor equations supplemented by the asymptotic condition (\[level-descendant\]). They are given in terms of the form factors of $\Theta$ and of the kernel solutions labeled as specified in table 4.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
$(0,0)$ $(1,1)$ $(2,2)$ $(3,3)$ $(4,4)$ $(5,5)$ $(6,6)$ $(7,7)$
--------------------------- ------------------------ ---------------------- ------------------------------------------- ----------------------------------------- ------------------------------------------- ------------------------------------------- -------------------------------------------
$F_{n}^{\Theta }$ $D_{n}F_{n}^{\Theta }$ $\left( D_{n}\right) $\left( D_{n}\right) ^{3}F_{n}^{\Theta }$ $\left( $\left( D_{n}\right) ^{5}F_{n}^{\Theta }$ $\left( D_{n}\right) ^{6}F_{n}^{\Theta }$ $\left( D_{n}\right)
^{2}F_{n}^{\Theta }$ D_{n}\right) ^{4}F_{n}^{\Theta }$ ^{7}F_{n}^{\Theta }$
$F_{n}^{I}=\delta _{n,0}$ $F_{n}^{K_{3}}$ $D_{n}F_{n}^{K_{3}}$ $\left( D_{n}\right) ^{2}F_{n}^{K_{3}}$ $\left( D_{n}\right) $\left( D_{n}\right) ^{4}F_{n}^{K_{3}}$ $\left(
^{3}F_{n}^{K_{3}}$ D_{n}\right) ^{5}F_{n}^{K_{3}}$
$F_{n}^{A,K_{3}}$ $D_{n}F_{n}^{A,K_{3}}$ $\left( D_{n}\right) $\left( D_{n}\right) ^{3}F_{n}^{A,K_{3}}$
^{2}F_{n}^{A,K_{3}}$
$F_{n}^{B,K_{3}}$ $D_{n}F_{n}^{B,K_{3}}$ $\left( D_{n}\right) $\left( D_{n}\right) ^{3}F_{n}^{B,K_{3}}$
^{2}F_{n}^{B,K_{3}}$
$F_{n}^{C,K_{3}}$ $D_{n}F_{n}^{C,K_{3}}$
$F_{n}^{D,K_{3}}$ $D_{n}F_{n}^{D,K_{3}}$
$F_{n}^{K_{4}}$ $D_{n}F_{n}^{K_{4}}$ $\left( D_{n}\right) $\left( D_{n}\right) ^{3}F_{n}^{K_{4}}$
^{2}F_{n}^{K_{4}}$
$F_{n}^{A,K_{4}}$ $D_{n}F_{n}^{A,K_{4}}$
$F_{n}^{B,K_{4}}$ $D_{n}F_{n}^{B,K_{4}}$
$F_{n}^{C,K_{4}}$ $D_{n}F_{n}^{C,K_{4}}$
$F_{n}^{D,K_{4}}$ $D_{n}F_{n}^{D,K_{4}}$
$F_{n}^{E,K_{4}}$ $D_{n}F_{n}^{E,K_{4}}$
$F_{n}^{K_{5}}$ $D_{n}F_{n}^{K_{5}}$
2 1 2 2 5 5 13 13
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
: Scalar solutions of the form factor equations. The first line specifies the level, the last line the number of solutions. $D_{n}\equiv
\left( \protect\sigma _{1}^{(n)}\bar{\protect\sigma}_{1}^{(n)}\right) $ is $m^{-2}$ times the eigenvalue of $\partial \bar{\partial}$ on the $n$-particle asymptotic state.
------------------------------------------------------------------------------------------------------------------
Kernel solution Initial condition
------------------- ----------------------------------------------------------------------------------------------
$F_{n}^{K_N}$ $F_{N}^{K_{N}}$
$F_{n}^{A,K_{3}}$ $\left( \sigma _{1}^{(3)}\right) ^{2}\bar{\sigma}_{2}^{(3)}F_{3}^{K_{3}}$
$F_{n}^{B,K_{3}}$ $\sigma _{2}^{(3)}\left( \bar{\sigma}_{1}^{(3)}\right)
^{2}F_{3}^{K_{3}}$
$F_{n}^{C,K_{3}}$ $\left( \sigma _{1}^{(3)}\right) ^{4}\left( \bar{\sigma}_{2}^{(3)}\right) ^{2}F_{3}^{K_{3}}$
$F_{n}^{D,K_{3}}$ $\left( \sigma _{2}^{(3)}\right) ^{2}\left( \bar{\sigma}_{1}^{(3)}\right) ^{4}F_{3}^{K_{3}}$
$F_{n}^{A,K_{4}}$ $\left( \sigma _{1}^{(4)}\right) ^{2}\bar{\sigma}_{2}^{(4)}F_{4}^{K_{4}}$
$F_{n}^{B,K_{4}}$ $\sigma _{2}^{(4)}\left( \bar{\sigma}_{1}^{(4)}\right)
^{2}F_{4}^{K_{4}}$
$F_{n}^{C,K_{4}}$ $\sigma _{2}^{(4)}\bar{\sigma}_{2}^{(4)}F_{4}^{K_{4}}$
$F_{n}^{D,K_{4}}$ $\left( \sigma _{1}^{(4)}\right) ^{3}\bar{\sigma}_{3}^{(4)}F_{4}^{K_{4}}$
$F_{n}^{E,K_{4}}$ $\sigma _{3}^{(4)}\left( \bar{\sigma}_{1}^{(4)}\right)
^{3}F_{4}^{K_{4}}$
------------------------------------------------------------------------------------------------------------------
: [The first column lists the names given to the form factor kernel solutions originating from the initial conditions specified in the second column. ]{}
The asymptotic properties $$\begin{aligned}
\lim_{\alpha \rightarrow +\infty }e^{-k\alpha }\sigma _{p}^{(n)}\left(
x_{1}e^{\alpha },..,x_{k}e^{\alpha },x_{k+1},..,x_{n}\right) & =\sigma
_{k}^{(k)}(x_{1},\ldots ,x_{k})\sigma _{p-k}^{(n-k)}(x_{k+1},\ldots ,x_{n}),\hspace{0.1in}k\leq p \\
& \\
\lim_{\alpha \rightarrow +\infty }e^{-p\alpha }\sigma _{p}^{(n)}\left(
x_{1}e^{\alpha },..,x_{k}e^{\alpha },x_{k+1},..,x_{n}\right) & =\sigma
_{p}^{(k)}(x_{1},\ldots ,x_{k}),\hspace{0.1in}\hspace{0.1in}\hspace{0.1in}k\geq p\end{aligned}$$ of the elementary symmetric polynomials are useful to check that each kernel solution corresponds to the level indicated in table 3.
Tables 5 and 6 list the scalar descendants of $\Theta$ and $I$, respectively, up to level $(7,7)$, as constructed in the previous section by continuing away from criticality the conformal basis. Notice that, for each level, the total number of independent operators obtained putting together the two operator families perfectly matches the number of solutions of the form factor boostrap for that level given in table 3. Hence, the last thing to check in order to show that the solutions of table 3 span the same space of those of tables 5 and 6 is that the kernel solutions of table 4 can be rewritten as linear combinations of the solutions of tables 5 and 6. This change of basis is given explicitly in Appendix C.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
$(0,0)$ $(1,1)$ $(2,2)$ $(3,3)$ $(4,4)$ $(5,5)$ $(6,6)$ $(7,7)$
------------------------------- ------------------------------------------------------ -------------------------------------------------------------- -------------------------------------------------------------- -------------------------------------------------------------- -------------------------------------------------------------- ---------------------------------------------------------------------- ------------------------------------------------------------------------------
$\overset{}{F_{n}^{\Theta }}$ $\overset{}{F_{n}^{\partial \bar{\partial}\Theta }}$ $\overset{}{F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }}$ $\overset{}{F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }}$ $\overset{}{F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }}$ $\overset{}{F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }}$ $\overset{}{F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }}$ $\overset{}{F_{n}^{\partial ^{7}\bar{\partial}^{7}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{R_{4}\bar{R}_{4}\Theta }}$ $\overset{}{F_{n}^{Q_{5}\bar{Q}_{5}\Theta }}$ $\overset{}{F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta }}$ $\overset{}{F_{n}^{\partial ^{2}Q_{5}\bar{\partial}^{2}\bar{Q}_{5}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{\partial ^{4}\bar{R}_{4}\Theta }}$ $\overset{}{F_{n}^{\partial ^{5}\bar{Q}_{5}\Theta }}$ $\overset{}{F_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }}$ $\overset{}{F_{n}^{\partial ^{7}\bar{\partial}^{2}\bar{Q}_{5}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{R_{4}\bar{\partial}^{4}\Theta }}$ $\overset{}{F_{n}^{Q_{5}\bar{\partial}^{5}\Theta }}$ $\overset{}{F_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta }}$ $\overset{}{F_{n}^{\partial ^{2}Q_{5}\bar{\partial}^{7}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{R_{6}\bar{\partial}^{6}\Theta }}$ $\overset{}{F_{n}^{Q_{7}\bar{\partial}^{7}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{\partial ^{6}\bar{R}_{6}\Theta }}$ $\overset{}{F_{n}^{\partial ^{7}\bar{Q}_{7}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{R_{6}\bar{R}_{6}\Theta }} $\overset{}{F_{n}^{Q_{7}\bar{Q}_{7}\Theta }}$
$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }}$ $\overset{}{F_{n}^{\partial ^{2}Q_{5}\bar{Q}_{7}\Theta }}$
$\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{}$ $\overset{}{F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta }}$ $\overset{}{F_{n}^{Q_{7}\bar{\partial}^{2}\bar{Q}_{5}\Theta }}$
1 1 1 1 4 4 9 9
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
: Scalar operators in the family of $\Theta $ up to level $(7,7)$. The first and last line are as in table 3.
$(0,0)$ $(1,1)$ $(2,2)$ $(3,3)$ $(4,4)$ $(5,5)$ $(6,6)$ $(7,7)$
--------------------------------------- ---------------- ---------------------------------- ------------------------------------------------------- --------------------------------------------------------------- --------------------------------------------------------------- --------------------------------------------------------------- ---------------------------------------------------------------
$\overset{}{F_{n}^{I}=\delta _{n,0}}$ $\overset{}{}$ $\overset{}{{F}_{n}^{T\bar{T}}}$ $\overset{}{F_{n}^{\partial \bar{\partial}T\bar{T}}}$ $\overset{}{F_{n}^{\partial ^{2}\bar{\partial}^{2}T\bar{T}}}$ $\overset{}{F_{n}^{\partial ^{3}\bar{\partial}^{3}T\bar{T}}}$ $\overset{}{F_{n}^{\partial ^{4}\bar{\partial}^{4}T\bar{T}}}$ $\overset{}{F_{n}^{\partial ^{5}\bar{\partial}^{5}T\bar{T}}}$
$\overset{}{F_{n}^{S_{4}\bar{S}_{4}T\bar{T}}}$ $\overset{}{F\vspace{0.02in}_{n}^{Q_{5}\bar{Q}_{5}T\bar{T}}}$
$\overset{}{F_{n}^{\partial ^{4}\bar{S}_{4}T\bar{T}}}$ $\overset{}{F_{n}^{\partial ^{5}\bar{Q}_{5}T\bar{T}}}$
$\overset{}{F_{n}^{S_{4}\bar{\partial}^{4}T\bar{T}}} $ $\overset{}{F_{n}^{Q_{5}\bar{\partial}^{5}T\bar{T}}}$
1 0 1 1 1 1 4 4
: Scalar operators in the family of $I$ up to level $(7,7)$. The first and last line are as in table 3.
Conclusion
==========
This paper provides the first extensive study of the operator space of a massive two-dimensional quantum field theory aimed at the explicit construction of descendant operators. From the point of view of the $S$-matrix bootstrap, in particular, we have shown how the identification of operator subspaces can be realized supplementing the form factor equations with asymptotic conditions containing the information about the level of the descendants, thus extending what originally done in [@immf; @DS; @DSC] for the primary operators.
The space of solutions generated in this way has been shown to coincide with the off-critical continuation of the conformal operator space obtained acting with the conserved quantities of the massive Lee-Yang model on the lowest non-trivial form factor solutions in the two operator families. The fact that not all the operators beyond level 7 can be generated using the conserved quantities is the model dependent feature that has determined the extent of our analysis of the operator space in this paper.
In constructing the composite descendant operators in the operator family of the identity we found that the proliferation of undetermined coefficients of resonant operators expected on purely dimensional grounds is actually limited by the structure of the operator space. More precisely, the requirement that some composite operators remain derivative operators also away from criticality can indeed be fulfilled by fixing in a unique way the coefficients of some resonant terms, with the consequence that only the “primitive” ambiguity contained in the definition of $T\bar{T} $ propagates through the operator family up to level 7. This as well as the previous points deserve to be further investigated in other models.
**Acknowledgments.** This work was partially supported by the European Commission programme HPRN-CT-2002-00325 (EUCLID) and by the COFIN “Teoria dei Campi, Meccanica Statistica e Sistemi Elettronici”.
Appendix
========
Let $Q_{s}\bar{Q}_{r}T\bar{T}$ be the off-critical continuation of the descendant $Q_{s}\bar{Q}_{r}L_{-2}\bar{L}_{-2}I$ obtained through the regularization $$Q_{s}\bar{Q}_{r}T\bar{T}(x)=\lim_{x^{\prime }\rightarrow x}\left\{ \left[
Q_{s},\left[ \bar{Q}_{r},T(x)\bar{T}(x^{\prime })\right] \right] -\mathcal{R}_{Q_{s}\bar{Q}_{r}T\bar{T}}(x,x^{\prime })\right\} , \label{q-qbar-ttbar}$$ with $\mathcal{R}_{Q_{s}\bar{Q}_{r}T\bar{T}}(x,x^{\prime })$ such that the above limit is non-singular. Then the matrix elements of $\left( \ref
{q-qbar-ttbar}\right) $ $$\begin{aligned}
&&\langle \theta _{m}^{\prime }\ldots \theta _{1}^{\prime }|Q_{s}\bar{Q}_{r}T\bar{T}(x)|\theta _{1}\ldots \theta _{n}\rangle = \notag \\
&=&\lim_{x^{\prime }\rightarrow x}\langle \theta _{m}^{\prime }\ldots \theta
_{1}^{\prime }|\left\{ \left[ Q_{s},\left[ \bar{Q}_{r},T(x)\bar{T}(x^{\prime
})\right] \right] -\mathcal{R}_{Q_{s}\bar{Q}_{r}T\bar{T}}(x,x^{\prime
})\right\} |\theta _{1}\ldots \theta _{n}\rangle\end{aligned}$$ must be finite for any $x$. Since $$\begin{aligned}
& \left. \langle \theta _{m}^{\prime }\ldots \theta _{1}^{\prime }|\left[
Q_{s},\left[ \bar{Q}_{r},T(x)\bar{T}(x^{\prime })\right] \right] |\theta
_{1}\ldots \theta _{n}\rangle =\left( \Lambda _{m}^{\left( s\right) }\left(
\theta _{1}^{\prime },..,\theta _{m}^{\prime }\right) -\Lambda _{n}^{\left(
s\right) }\left( \theta _{1},..,\theta _{n}\right) \right) \times \right.
\notag \\
& \,\text{\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ }\times \left( \Lambda _{m}^{\left( -r\right) }\left( \theta _{1}^{\prime
},..,\theta _{m}^{\prime }\right) -\Lambda _{n}^{\left( -r\right) }\left(
\theta _{1},..,\theta _{n}\right) \right) \langle \theta _{m}^{\prime
}\ldots \theta _{1}^{\prime }|T(x)\bar{T}(x^{\prime })|\theta _{1}\ldots
\theta _{n}\rangle\end{aligned}$$ the regularization term is fixed to $$\mathcal{R}_{Q_{s}\bar{Q}_{r}T\bar{T}}(x,x^{\prime })=\left[ Q_{s},\left[
\bar{Q}_{r},\mathcal{R}_{T\bar{T}}(x,x^{\prime })\right] \right] +\text{resonances}(x)\,,$$ where $\mathcal{R}_{T\bar{T}}(x,x^{\prime })$ is the regularization term (\[regttbar\]) of the operator $T\bar{T}$. Putting all together we have $$Q_{s}\bar{Q}_{r}T\bar{T}(x)=Q_{s}\bar{Q}_{r}\left( T\bar{T}\right) (x)+\text{resonances}(x),$$ where $Q_{s}\bar{Q}_{r}\left( T\bar{T}\right) $ is the local field obtained acting with the conserved commuting quantities $Q_{s}\bar{Q}_{r}$ on the operator (\[regularized\]).
Appendix
========
Consider a massive two-dimensional field theory without internal symmetries. It was argued in [@DSC] that in such a case the form factors of a primary operator $\Phi _{0}$ satisfy the asymptotic factorization property $$\begin{gathered}
\lim_{\alpha \longrightarrow +\infty }\text{ }F_{n}^{\Phi _{0}}\left( \theta
_{1}+\alpha ,..,\theta _{k}+\alpha ,\theta _{k+1},..,\theta _{n}\right) =\hspace{0.4in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in} \notag \\
\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.4in}\hspace{0.4in}=\frac{1}{\left\langle \Phi _{0}\right\rangle }F_{k}^{\Phi
_{0}}\left( \theta _{1},..,\theta _{k}\right) F_{n-k}^{\Phi _{0}}\left(
\theta _{k+1},..,\theta _{n}\right) \text{,} \label{primaryfactorization}\end{gathered}$$ for $k=0,1,\ldots ,n$. Here we consider the effect of the same limit on the descendant operators $$\Phi^{\left\{ s_{1},..,s_{a}\right\} \left\{ r_{1},..,r_{b}\right\} }\left(
x\right) =[\bar{Q}_{r_{b}},[...,[\bar{Q}_{r_{1}},[Q_{s_{a}},[...,[Q_{s_{1}},\Phi _{0}\left( x\right) ]]...]]...]]$$ obtained acting on $\Phi _{0}$ with the commuting conserved quantities $Q_{s} $ and $\bar{Q}_{r}$ ($r$ and $s$ positive integers). The level of such operators is $(l,\bar{l})=\left(
\sum_{i=1}^{a}s_{i},\sum_{j=1}^{b}r_{j}\right) $.
The form factors for these operators take the form $$F_{n}^{\Phi^{\{s_{1},..,s_{a}\}\{r_{1},..,r_{b}\}}}\left( \theta
_{1},..,\theta _{n}\right) =\left( -1\right) ^{l+\bar{l}}\Lambda
_{n}^{\left\{ s_{1},..,s_{a}\right\} \left\{ r_{1},..,r_{b}\right\} }\left(
\theta _{1},..,\theta _{n}\right) F_{n}^{\Phi _{0}}\left( \theta
_{1},..,\theta _{n}\right) \label{ccc-descendent-form-factors}$$ where $$\Lambda _{n}^{\left\{ s_{1},..,s_{a}\right\} \left\{ r_{1},..,r_{b}\right\}
}\left( \theta _{1},..,\theta _{n}\right) =\prod_{\mu =1}^{a}\Lambda
_{n}^{\left( s_{\mu }\right) }\left( \theta _{1},..,\theta _{n}\right)
\prod_{\upsilon =1}^{b}\Lambda _{n}^{\left( -r_{\upsilon }\right) }\left(
\theta _{1},..,\theta _{n}\right) \label{landa-functions-2}$$ with $\Lambda _{n}^{\left( s\right) }$ defined in $\left( \ref
{landa-functions}\right) $.
It follows from (\[primaryfactorization\]) and the asymptotic factorization properties $$\begin{gathered}
\lim_{\alpha \longrightarrow +\infty }\text{ }e^{-s\alpha }\Lambda
_{n}^{\left( s\right) }\left( \theta _{1}+\alpha ,..,\theta _{k}+\alpha
,\theta _{k+1},..,\theta _{n}\right) =\lim_{\alpha \longrightarrow +\infty }\text{ }e^{-s\alpha }m^{s}(\sum_{i=1}^{k}e^{s\left( \theta _{i}+\alpha
\right) }+ \notag \\
+\sum_{i=k+1}^{n}e^{s\theta _{i}})=m^{s}\sum_{i=1}^{k}e^{s\theta
_{i}}=\Lambda _{k}^{\left( s\right) }\left( \theta _{1},..,\theta
_{k}\right) ,\end{gathered}$$ $$\begin{gathered}
\lim_{\alpha \longrightarrow +\infty }\text{ }\Lambda _{n}^{\left( -r\right)
}\left( \theta _{1}+\alpha ,..,\theta _{k}+\alpha ,\theta _{k+1},..,\theta
_{n}\right) =\lim_{\alpha \longrightarrow +\infty }\text{ }m^{r}(\sum_{i=1}^{k}e^{-r\left( \theta _{i}+\alpha \right) }+ \notag \\
+\sum_{i=k+1}^{n}e^{-r\theta _{i}})=m^{r}\sum_{i=k+1}^{n}e^{-r\theta
_{i}}=\Lambda _{n-k}^{\left( -r\right) }\left( \theta _{k+1},..,\theta
_{n}\right) ,\end{gathered}$$ that the form factors of $\Phi^{\left\{ s_{1},..,s_{a}\right\} \left\{
r_{1},..,r_{b}\right\} }$ satisfy $$\begin{gathered}
\lim_{\alpha \longrightarrow +\infty }\text{ }e^{-l\alpha
}F_{n}^{\Phi^{\{s_{1},..,s_{a}\}\{r_{1},..,r_{b}\}}}\left( \theta
_{1}+\alpha ,..,\theta _{k}+\alpha ,\theta _{k+1},..,\theta _{n}\right) =\hspace{0.4in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in} \notag \\
\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.15in}\hspace{0.4in}\hspace{0.4in}=\frac{1}{\left\langle \Phi _{0}\right\rangle }F_{k}^{\Phi^{\{s_{1},..,s_{a}\}\{\}}}\left( \theta _{1},..,\theta
_{k}\right) F_{n-k}^{\Phi^{\{\}\{r_{1},..,r_{b}\}}}\left( \theta
_{k+1},..,\theta _{n}\right) \label{PROPRIETY-2}\end{gathered}$$ for $k=0,1,\ldots ,n$. Hence, the form factors of the generic $(l,\bar{l})$ descendant $\Phi^{\left\{ s_{1},..,s_{a}\right\} \left\{
r_{1},..,r_{b}\right\} }$ factorizes into the form factors of the chiral descendants $\Phi^{\left\{ s_{1},..,s_{a}\right\} \left\{ {}\right\} }$ and $\Phi^{\left\{ {}\right\} \left\{ r_{1},..,r_{b}\right\} }$ of level $(l,0)$ and $(0,\bar{l})$, respectively.
Denote by $\Phi _{(l,\bar{l})}$ a generic linear combination of the level $(l,\bar{l})$ descendants $\Phi^{\left\{ s_{1},..,s_{a}\right\} \left\{
r_{1},..,r_{b}\right\} }$ of a scalar primary other than the identity. Then (\[PROPRIETY-2\]) implies that the form factors of $\Phi _{(l,\bar{l})}$ are homogeneous functions, with respect to the variables $x_{i}\equiv
e^{\theta _{i}}$, of degree $l-\bar{l}$ with further asymptotic behavior $$F_{n}^{\Phi _{(l,\bar{l})}}\left( \theta _{1}+\alpha ,..,\theta _{k}+\alpha
,\theta _{k+1},...,\theta _{n}\right) \sim e^{l\alpha } \label{PROPRIETY-1}$$ for $\alpha\rightarrow +\infty$, $n>1$ and $1\leq k\leq n-1$.
Appendix
========
We give here the expansions of the kernel solutions appearing in table 3 in terms of the solutions of tables 5 and 6. The kernel solution $F_{n}^{K_{3}}$ arising at level $(2,2)$ is related to $F_{n}^{T\bar{T}}$ by (\[fnttbar\]). Throughout this appendix we take $c=0$ in (\[fnttbar\]). Then we have
$$\begin{array}{c}
F_{n}^{A,K_{3}}=\frac{1}{5m^{8}\langle \Theta \rangle }\left(
F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }-iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }\right) -\frac{1}{m^{6}\langle \Theta \rangle }F_{n}^{\partial
^{3}\bar{\partial}^{3}\Theta }+\frac{1}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }
\end{array}
\text{ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \
\ \ \ \ \ \ \ \ }$$
$$\begin{array}{c}
F_{n}^{B,K_{3}}=\frac{1}{5m^{8}\langle \Theta \rangle }\left(
F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }+iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) -\frac{1}{m^{6}\langle \Theta \rangle }F_{n}^{\partial
^{3}\bar{\partial}^{3}\Theta }+\frac{1}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }
\end{array}
\text{ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \
\ \ \ \ \ \ \ \ }$$
$$\begin{array}{l}
F_{n}^{K_{4}}=\frac{1}{25m^{8}\langle \Theta \rangle }\left( F_{n}^{\partial
^{4}\bar{\partial}^{4}\Theta }-iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta
}+iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }+F_{n}^{R_{4}\bar{R}_{4}\Theta
}\right) +\frac{1}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }-\frac{2}{m^{4}\langle \Theta \rangle }F_{n}^{\partial
^{2}\bar{\partial}^{2}\Theta }+\frac{1}{\langle \Theta \rangle }F_{n}^{\Theta } \\
\\
-\frac{1}{m^{2}\langle \Theta \rangle ^{2}}F_{n}^{\partial \bar{\partial}T\bar{T}}+\frac{1}{\langle \Theta \rangle ^{2}}F_{n}^{T\bar{T}}
\end{array}
\text{\ \ \ }$$ $$$$ for the kernels arising at level $(4,4)$, and $$\begin{array}{l}
F_{n}^{C,K_{3}}=\frac{1}{175m^{12}\langle \Theta \rangle }\left(
8F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }-5F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }-7F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}-28iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta
}-20iF_{n}^{\partial ^{6}\bar{R}_{6}\Theta }-2iF_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta }\right) \\
\\
+\frac{1}{5m^{8}\langle \Theta \rangle }\left( -6F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }+iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }\right) +\frac{3}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta
}-\frac{3}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }+\frac{1}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }\vspace{0.07in}
\end{array}$$ $$\begin{array}{l}
F_{n}^{D,K_{3}}\text{ }=\frac{1}{175m^{12}\langle \Theta \rangle }\left(
8F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }-5F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta }-7F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}+2iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }+28iF_{n}^{\partial
Q_{5}\bar{\partial}^{6}\Theta }+20iF_{n}^{R_{6}\bar{\partial}^{6}\Theta
}\right) \\
\\
+\frac{1}{5m^{8}\langle \Theta \rangle }\left( -6F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }-iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) +\frac{3}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta
}-\frac{3}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }+\frac{1}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }
\end{array}$$ $$\begin{array}{l}
F_{n}^{A,K_{4}}=\frac{1}{175m^{12}\langle \Theta \rangle }\left(
2F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }+5F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }+7F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}-7iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }-5iF_{n}^{\partial
^{6}\bar{R}_{6}\Theta }+2iF_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta
}\right) \\
\\
+\frac{1}{5m^{10}\langle \Theta \rangle }\left( -F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }+iF_{n}^{\partial ^{5}\bar{Q}_{5}\Theta }\right) +\frac{1}{5m^{8}\langle \Theta \rangle }\left( 6F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }-iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }\right) -\frac{3}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }+\frac{3}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta } \\
\\
-\frac{1}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }
\end{array}$$ $$\begin{array}{l}
F_{n}^{B,K_{4}}\text{ }=\frac{1}{175m^{12}\langle \Theta \rangle }\left(
2F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }+5F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta }+7F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}-2iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }+7iF_{n}^{\partial
Q_{5}\bar{\partial}^{6}\Theta }+5iF_{n}^{R_{6}\bar{\partial}^{6}\Theta
}\right) \\
\\
+\frac{1}{5m^{10}\langle \Theta \rangle }\left( -F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }-iF_{n}^{Q_{5}\bar{\partial}^{5}\Theta }\right) +\frac{1}{5m^{8}\langle \Theta \rangle }\left( 6F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }+iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) -\frac{3}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }+\frac{3}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta } \\
\\
-\frac{1}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }
\end{array}$$ $$\begin{array}{l}
F_{n}^{C,K_{4}}\text{ }=\frac{1}{1225m^{12}\langle \Theta \rangle }\left(
4F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }+25F_{n}^{R_{6}\bar{R}_{6}\Theta }+35F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta
}+35F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }+49F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta }-14iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }\right. \\
\\
\left. -10iF_{n}^{\partial ^{6}\bar{R}_{6}\Theta }+14iF_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta }+10iF_{n}^{R_{6}\bar{\partial}^{6}\Theta }\right) +\frac{1}{25m^{10}\langle \Theta \rangle }\left( -F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }-F_{n}^{Q_{5}\bar{Q}_{5}\Theta }+iF_{n}^{\partial ^{5}\bar{Q}_{5}\Theta }-iF_{n}^{Q_{5}\bar{\partial}^{5}\Theta }\right) \\
\\
+\frac{1}{25m^{8}\langle \Theta \rangle }\left( F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }+F_{n}^{R_{4}\bar{R}_{4}\Theta }-iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }+iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) +\frac{1}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }-\frac{4}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }+\frac{5}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta } \\
\\
-\frac{2}{\langle \Theta \rangle }F_{n}^{\Theta }
\end{array}$$ $$\begin{array}{l}
F_{n}^{D,K_{4}}\text{ }=\frac{1}{245m^{12}\langle \Theta \rangle }\left(
10F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }-25F_{n}^{R_{6}\bar{R}_{6}\Theta }-35F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta
}-35F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }-84iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }\right. \\
\\
\left. +49F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}+10iF_{n}^{\partial ^{6}\bar{R}_{6}\Theta }+35iF_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta }+25iF_{n}^{R_{6}\bar{\partial}^{6}\Theta }\right) +\frac{1}{35m^{10}\langle \Theta \rangle }\left( -33F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }+14F_{n}^{Q_{5}\bar{Q}_{5}\Theta }\right. \\
\\
\left. +26iF_{n}^{\partial ^{5}\bar{Q}_{5}\Theta }-33iF_{n}^{Q_{5}\bar{\partial}^{5}\Theta }\right) +\frac{1}{5m^{8}\langle \Theta \rangle }\left(
-3F_{n}^{R_{4}\bar{R}_{4}\Theta }-2iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta
}+5iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) +\frac{1}{m^{6}\langle
\Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta } \\
\\
+\frac{10}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }-\frac{20}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }+\frac{10}{\langle \Theta \rangle }F_{n}^{\Theta }+\frac{1}{5m^{8}\langle \Theta \rangle ^{2}}\left( iF_{n}^{\partial ^{4}\bar{S}_{4}T\bar{T}}-F_{n}^{S_{4}\bar{S}_{4}T\bar{T}}\right) +\frac{5}{m^{4}\langle
\Theta \rangle ^{2}}F_{n}^{\partial ^{2}\bar{\partial}^{2}T\bar{T}} \\
\\
-\frac{10}{m^{2}\langle \Theta \rangle ^{2}}F_{n}^{\partial \bar{\partial}T\bar{T}}+\frac{5}{\langle \Theta \rangle ^{2}}F_{n}^{T\bar{T}}
\end{array}$$ $$\begin{array}{l}
F_{n}^{E,K_{4}}\text{ }=\frac{1}{35m^{12}\langle \Theta \rangle }\left(
-12F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }+7iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }-5iF_{n}^{\partial ^{6}\bar{R}_{6}\Theta
}\right) +\frac{1}{35m^{10}\langle \Theta \rangle }\left( 33F_{n}^{\partial
^{5}\bar{\partial}^{5}\Theta }+7iF_{n}^{\partial ^{5}\bar{Q}_{5}\Theta
}\right) \\
\\
+\frac{1}{5m^{8}\langle \Theta \rangle }\left( -7F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }-3iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }\right) +\frac{1}{m^{6}\langle \Theta \rangle }F_{n}^{\partial ^{3}\bar{\partial}^{3}\Theta }+\frac{1}{5m^{8}\langle \Theta \rangle ^{2}}\left(
F_{n}^{\partial ^{4}\bar{\partial}^{4}T\bar{T}}-iF_{n}^{\partial ^{4}\bar{S}_{4}T\bar{T}}\right)
\end{array}$$ $$\begin{array}{l}
F_{n}^{K_{5}}\text{ }=\frac{1}{1225m^{12}\langle \Theta \rangle }\left(
-94F_{n}^{\partial ^{6}\bar{\partial}^{6}\Theta }+25F_{n}^{R_{6}\bar{R}_{6}\Theta }+35F_{n}^{R_{6}\bar{\partial}\bar{Q}_{5}\Theta
}+35F_{n}^{\partial Q_{5}\bar{R}_{6}\Theta }+84iF_{n}^{\partial ^{6}\bar{\partial}\bar{Q}_{5}\Theta }\right. \\
\\
\left. -49F_{n}^{\partial Q_{5}\bar{\partial}\bar{Q}_{5}\Theta
}-10iF_{n}^{\partial ^{6}\bar{R}_{6}\Theta }-84iF_{n}^{\partial Q_{5}\bar{\partial}^{6}\Theta }+10iF_{n}^{R_{6}\bar{\partial}^{6}\Theta }\right) +\frac{1}{175m^{10}\langle \Theta \rangle }\left( 66F_{n}^{\partial ^{5}\bar{\partial}^{5}\Theta }-14F_{n}^{Q_{5}\bar{Q}_{5}\Theta }\right. \\
\\
\left. -26iF_{n}^{\partial ^{5}\bar{Q}_{5}\Theta }+26iF_{n}^{Q_{5}\bar{\partial}^{5}\Theta }\right) +\frac{1}{25m^{8}\langle \Theta \rangle }\left(
-7F_{n}^{\partial ^{4}\bar{\partial}^{4}\Theta }+3F_{n}^{R_{4}\bar{R}_{4}\Theta }+2iF_{n}^{\partial ^{4}\bar{R}_{4}\Theta }-2iF_{n}^{R_{4}\bar{\partial}^{4}\Theta }\right) \\
\\
-\frac{2}{m^{4}\langle \Theta \rangle }F_{n}^{\partial ^{2}\bar{\partial}^{2}\Theta }+\frac{4}{m^{2}\langle \Theta \rangle }F_{n}^{\partial \bar{\partial}\Theta }-\frac{2}{\langle \Theta \rangle }F_{n}^{\Theta }+\frac{1}{25m^{8}\langle \Theta \rangle ^{2}}\left( F_{n}^{\partial ^{4}\bar{\partial}^{4}T\bar{T}}+F_{n}^{S_{4}\bar{S}_{4}T\bar{T}}+iF_{n}^{S_{4}\bar{\partial}^{4}T\bar{T}}\right. \\
\\
\left. -iF_{n}^{\partial ^{4}\bar{S}_{4}T\bar{T}}\right) -\frac{1}{m^{4}\langle \Theta \rangle ^{2}}F_{n}^{\partial ^{2}\bar{\partial}^{2}T\bar{T}}+\frac{2}{m^{2}\langle \Theta \rangle ^{2}}F_{n}^{\partial \bar{\partial}T\bar{T}}-\frac{1}{\langle \Theta \rangle ^{2}}F_{n}^{T\bar{T}}
\end{array}$$ $$$$ for the kernels arising at level $(6,6)$.
[99]{} A.A. Belavin, A.M. Polyakov and A.B. Zamolodchikov, Nucl. Phys. B 241 (1984) 333.
A.B. Zamolodchikov, Advanced Studies in Pure Mathematics 19 (1989) 641; ; Int. J. Mod. Phys. A 3 (1988) 743.
M. Karowski, P. Weisz, Nucl. Phys. B 139 (1978) 455.
F.A. Smirnov, Form Factors in Completely Integrable Models of Quantum Field Theory, World Scientific, 1992. Phys. A 3 (1988) 743.
J.L. Cardy and G. Mussardo, Nucl. Phys. B 340 (1990) 387.
A. Koubek, Nucl. Phys. B 435 (1995) 703.
F. Smirnov, Nucl. Phys. B 453 (1995) 807.
M. Jimbo, T. Miwa, Y. Takeyama, Counting minimal form factors of the restricted sine-Gordon model, math-ph/0303059.
Al. B. Zamolodchikov, Nucl. Phys. B 348 (1991) 619.
G. Delfino and G. Niccoli, Nucl. Phys. B 707 (2005) 381.
R. Guida and N. Magnoli, Nucl. Phys. B 471 (1996) 361.
V. Fateev, D. Fradkin, S. Lukyanov, A. Zamolodchikov and Al. Zamolodchikov, Nucl. Phys. B 540 (1999) 587.
A.B. Zamolodchikov and Al.B. Zamolodchikov, Ann. Phys. 120 (1979) 253.
G. Delfino and G. Mussardo, Nucl. Phys. B 455 (1995) 724.
C.N. Yang and T.D. Lee, Phys. Rev. 87 (1952) 404.
T.D. Lee and C.N. Yang, Phys. Rev. 87 (1952) 410.
M.E. Fisher, Phys. Rev. Lett. 40 (1978) 1610.
J.L. Cardy, Phys. Rev. Lett. 54 (1985) 1354.
B.L. Feigen and D.B. Fuchs, Funct. Anal. Appl.* *17 (1983), 241.
A. Rocha-Caridi, in “Vertex Operators in Mathrmatics and Physics”, J. Lepowsky, S. Mandelstam and I.M. Singer eds. (Springer 1985) 451.
P. Christe, Int. J. Mod. Phys. A6 (1991), 5271.
J.L. Cardy and G. Mussardo, Phys. Lett. B 225 (1989) 275.
F.A. Smirnov, Nucl. Phys. B 337 (1990) 156.
G. Delfino, P. Simonetti and J.L. Cardy, Phys. Lett. B 387 (1996) 327.
Al.B. Zamolodchikov, Nucl. Phys. B 342 (1990) 695.
A.B. Zamolodchikov, Expectation value of composite field $T\bar{T}$ in two-dimensional quantum field theory, hep-th/0401146.
G. Delfino and P. Simonetti, Phys. Lett. B 383 (1996) 450.
[^1]: The rapidity variables $\theta _{k}$ parameterize the on-shell momenta of the particles as $(p_{k}^{0},p_{k}^{1})=(m\cosh \theta _{k},m\sinh \theta
_{k})$. The generic matrix elements with particles also on the left can be obtained by analytic continuation of (\[form factors\]).
[^2]: Equations (\[qasymp\]) and (\[qbarasymp\]) also fix our normalization for the conserved quantities.
[^3]: More precisely $$\partial |\theta _{1},\ldots ,\theta _{n}\rangle =-im\sigma
_{1}^{(n)}|\theta _{1},\ldots ,\theta _{n}\rangle \hspace{0.1in};\hspace{0.1in}\bar{\partial}|\theta _{1},\ldots ,\theta _{n}\rangle =im\bar{\sigma}_{1}^{(n)}|\theta _{1},\ldots ,\theta _{n}\rangle$$ where $$\bar{\sigma}_{i}^{(n)}\equiv \sigma _{n-i}^{(n)}/\sigma _{n}^{(n)}\text{.}$$
[^4]: We show in appendix B that these properties hold for all the descendant operators obtained acting on a primary with conserved quantities.
|
Don't think I've ever seen a "good news" story involving Adobe... why are they still in business?
Click to expand...
Market inertia.
You want to get a job in publishing, animation, illustration or graphic design? You will need to know Adobe CS, because your boss will use to Adobe CS, his/her boss will have learned Adobe CS and none of them will even entertain the idea of switching because all their clients use Adobe CS.
Short of personally going round to every customer's house and pooing on the carpet Adobe will be the entrenched infrastructure of creative industry forever and all time.
That and the fact that there really isn't a worthwhile alternative. I have spent many thousands - many tens of thousands - of hours using Adobe products. Part of the inertia is that nobody who's done that wants, or frankly is in a financial position, to do so again using someone else's products. It's not really a choice. I don't have any practical option to throw out After Effects and go to Fusion because I have work to get done and a certain period of time in which to do it.
Adobe know this, and their misbehaviour is effectively unbounded. Right now there are a lot of people paying a lot of money every month, sight unseen, for possible product updates that might possibly, or might not, appear, and might, or might not, possibly be of use to them. Adobe's absolute dominance is a very serious problem, best highlighted when they went to this software-by-subscription model in the first place. I have so far managed to avoid having to move to it, but it's only a matter of time. In short the applications are brilliant but Adobe are about the most unpopular company I've ever come across among people who actually think the product is very good. And it is. Photoshop is one of the killer apps of computing in general.
But right now, Adobe can charge any price. They can make any mistake. They can impose any restriction. They can make any rule, and people will follow it. They can keep charging, and charging, and charging, and if you think about it they have not the slightest motive to ever work on the software ever again. They don't have to do anything, ever, and they get infinite money. This is not OK. This is now how commerce is supposed to work.
The ideal solution is for the open source community to get off its collective backside and produce an alternative, but that would require the the open source community to become organised, and user-focussed, and to start listening to the opinions of people who are not software engineers. And that, of course, is farce of a concept.
^ Truth. I know people who are sticking with CS6 to avoid paying over and above for software that is essentially the same.
I've whittled my subscription down to just PS, and LR (which I never use); I use PS for hours every day for concept art/illustration, but I store my files on my own hardware and have no interest in using anybody else's alternatives. Even though PS by itself is relatively cheap, it's still over £100 anually.
I honestly don't mind if it's sufficiently cheap. Something like Lightworks, for instance, which is a competent if slightly esoteric NLE, is under £8.50 a month if you go for the year option, or £250 forever. At that level, really, who cares.
But CC is not under £8.50 a month. And to add insult to several preexisting insults and very severe injuries, it's much more expensive here than it is in the USA. |
{
"name": "jeremeamia/superclosure",
"type": "library",
"description": "Serialize Closure objects, including their context and binding",
"keywords": ["closure", "serialize", "serializable", "function", "parser", "tokenizer", "lambda"],
"homepage": "https://github.com/jeremeamia/super_closure",
"license": "MIT",
"authors": [
{
"name": "Jeremy Lindblom",
"email": "[email protected]",
"homepage": "https://github.com/jeremeamia",
"role": "Developer"
}
],
"require": {
"php": ">=5.4",
"nikic/php-parser": "^1.2|^2.0",
"symfony/polyfill-php56": "^1.0"
},
"require-dev": {
"phpunit/phpunit": "^4.0|^5.0"
},
"autoload": {
"psr-4": {
"SuperClosure\\": "src/"
}
},
"autoload-dev": {
"psr-4": {
"SuperClosure\\Test\\": "tests/"
}
},
"extra": {
"branch-alias": {
"dev-master": "2.2-dev"
}
}
}
|
import effects.basic
import effects.basic1
val b = basic()
val b1 = basic1(b)
b1.m5() |
Q:
DataTables and Rails Setup But Showing No Change
I've followed along with the following tutorials to get DataTables setup in my Rails app, but I am seeing no change. Here's what I followed:
https://github.com/rweng/jquery-datatables-rails
http://railscasts.com/episodes/340-datatables
I am not getting an error. I'm just seeing no change. And I restarted my server.
Application.js
//= require dataTables/jquery.dataTables
Application.css
*= require dataTables/jquery.dataTables
View:
<table id="products">
<thead>
<tr>
<th>Name</th>
<th>Price</th>
</tr>
</thead>
<tbody>
<tr>
<td>Something</td>
<td>Something</td>
</tr>
<tr>
<td>Something</td>
<td>Something</td>
</tr>
<tr>
<td>Something</td>
<td>Something</td>
</tr>
</tbody>
</table>
Products.js.coffee
jQuery ->
$('#products').dataTable
I just want to be able to sort columns. Why is this not working?
A:
Try converting Products.js.coffee back to regular javascript and seeing if the results are the same. If so, the problem is either with the javascript itself or the compilation of the coffeescript (make sure the coffee-rails gem is in the Gemfile). Also check out the RailsCast Coffeescript Episode.
|
The present invention relates to a resonator-type surface-acoustic-wave filter with reduced insertion loss.
The resonator-type surface-acoustic-wave filters (referred to below as resonator-type SAW filters) considered in the present invention have the well-known ladder circuit configuration. The ladder configuration does not require a matching circuit, and has such further advantages as low loss, high attenuation, and narrow bandwidth, but there is a trade-off between loss and attenuation. If the ladder configuration contains only one stage, or a small number of stages, insertion loss is low but attenuation in the stopbands may be inadequate. With a large number of stages, stopband attenuation improves but insertion loss increases, and the filter becomes large in size.
A known solution to this problem couples one or more additional SAW resonators in series with the ladder circuit to improve the stopband attenuation. The present invention addresses this problem in the upper stopband, so the conventional solution would be to provide an additional SAW resonator with frequency characteristics adapted to improve the attenuation in that stopband. This solution is unsatisfactory in the following respects. First, the additional SAW resonator increases the insertion loss to some extent. Second, impedance matching characteristics are worsened, because the resonant frequency of the additional SAW resonator lies above the passband of the filter. (This is because the antiresonant frequency of the additional SAW resonator must be higher than the antiresonant frequency of the SAW resonator or resonators in the series arm of the filter.) Third, the additional SAW resonator increases the size of the filter. |
Green Ink: Climate Hijinks and Another Book from Al Gore
Crude oil futures slipped to about $77 ahead of an expected increase in U.S. oil inventories, Bloomberg reports.
The real energy revolution, writes Dan Yergin in the WSJ, is natural gas. Specifically, the shale-gas explosion that has changed the energy game for the U.S.—and maybe the world.
More hijinks in the Senate. Republicans warn Sen. Barbara Boxer not to ignore their boycott, because unilateral Democratic action could “severely damage” the prospects of passing a climate bill, in the WSJ and the WaPo.
Sen. Boxer’s decision to proceed with the markup of climate legislation despite GOP opposition means she’s yanked back any olive branch she may have tendered this time around. “She’s poisoned the waters,” a Democratic aide tells Politico. |
Quest Heat Systems — Booth #145
Quest Heat Systems offer flexibility and power in bed bug eradication without the use of dangerous high-voltage equipment or chemicals. The Quest Hydronic Heat System features the CHH 300 Central Hydronic Heater. The Quest CHH 300 is CSA/TUV certified and uses a low-pressure heater to maximize efficiency while eliminating the inherent risks of a high-pressure boiler. It is designed for portable use and comes mounted in tandem axle 7,000 pound GVWR trailer. The CHH 300 has 308,000 BTUs of safe heating capacity – more than enough to run the 6 fan coils (included in the Quest hydronic system) simultaneously. This diesel-fired heater allows for the highest efficiency, provides the easiest fuel refilling and storage. And, diesel is the lowest cost energy source to produce heat. Minimize operational headaches and maximize your profit with Quest Heat Systems. Visit Quest at booth # 145 or www.HeatUpBedBugs.Com. |
Q:
AWS - OS Error permission denied Lambda Script
I'm trying to execute a Lambda Script in Python with an imported library, however I'm getting permission errors.
I am also getting some alerts about the database, but database queries are called after the subprocess so I don't think they are related. Could someone explain why do I get error?
Alert information
Alarm:Database-WriteCapacityUnitsLimit-BasicAlarm
State changed to INSUFFICIENT_DATA at 2016/08/16. Reason: Unchecked: Initial alarm creation
Lambda Error
[Errno 13] Permission denied: OSError Traceback (most recent call last):File "/var/task/lambda_function.py", line 36, in lambda_handler
xml_output = subprocess.check_output(["./mediainfo", "--full", "--output=XML", signed_url])
File "/usr/lib64/python2.7/subprocess.py", line 566, in check_output process = Popen(stdout=PIPE, *popenargs, **kwargs)
File "/usr/lib64/python2.7/subprocess.py", line 710, in __init__ errread, errwrite) File "/usr/lib64/python2.7/subprocess.py", line 1335, in _execute_child raise child_exception
OSError: [Errno 13] Permission denied
Lambda code
import logging
import subprocess
import boto3
SIGNED_URL_EXPIRATION = 300 # The number of seconds that the Signed URL is valid
DYNAMODB_TABLE_NAME = "TechnicalMetadata"
DYNAMO = boto3.resource("dynamodb")
TABLE = DYNAMO.Table(DYNAMODB_TABLE_NAME)
logger = logging.getLogger('boto3')
logger.setLevel(logging.INFO)
def lambda_handler(event, context):
"""
:param event:
:param context:
"""
# Loop through records provided by S3 Event trigger
for s3_record in event['Records']:
logger.info("Working on new s3_record...")
# Extract the Key and Bucket names for the asset uploaded to S3
key = s3_record['s3']['object']['key']
bucket = s3_record['s3']['bucket']['name']
logger.info("Bucket: {} \t Key: {}".format(bucket, key))
# Generate a signed URL for the uploaded asset
signed_url = get_signed_url(SIGNED_URL_EXPIRATION, bucket, key)
logger.info("Signed URL: {}".format(signed_url))
# Launch MediaInfo
# Pass the signed URL of the uploaded asset to MediaInfo as an input
# MediaInfo will extract the technical metadata from the asset
# The extracted metadata will be outputted in XML format and
# stored in the variable xml_output
xml_output = subprocess.check_output(["./mediainfo", "--full", "--output=XML", signed_url])
logger.info("Output: {}".format(xml_output))
save_record(key, xml_output)
def save_record(key, xml_output):
"""
Save record to DynamoDB
:param key: S3 Key Name
:param xml_output: Technical Metadata in XML Format
:return:
"""
logger.info("Saving record to DynamoDB...")
TABLE.put_item(
Item={
'keyName': key,
'technicalMetadata': xml_output
}
)
logger.info("Saved record to DynamoDB")
def get_signed_url(expires_in, bucket, obj):
"""
Generate a signed URL
:param expires_in: URL Expiration time in seconds
:param bucket:
:param obj: S3 Key name
:return: Signed URL
"""
s3_cli = boto3.client("s3")
presigned_url = s3_cli.generate_presigned_url('get_object', Params={'Bucket': bucket, 'Key': obj},
ExpiresIn=expires_in)
return presigned_url
A:
I'm fairly certain that this is a restriction imposed by the lambda execution environment, but it can be worked around by executing the script through the shell.
Try providing shell=True to your subprocess call:
xml_output = subprocess.check_output(["./mediainfo", "--full", "--output=XML", signed_url], shell=True)
|
FAMILIJNY – SOFT daily face and body care cream – 300ml
Master of day-to-day care
A delicate cream with silk proteins, vitamin E, allantoin and a UVB filter is recommended for the daily care of every skin type, also dry skin and susceptible to drying due to various external factors. It brings good effects; if used after daily hygienic routines, it deeply moisturises the face and body skin, giving it a pleasant and long-lasting feeling of freshness and smoothness.
What else is worth knowing about the FAMILIJNY – SOFT daily face and body care cream?
• It was dermatologically tested
• It gently regulates skin oiling, making it soft and elastic
• It is easy to spread and absorbs quickly owing to the oil in water formula
Master of day-to-day care
A delicate cream with silk proteins, vitamin E, allantoin and a UVB filter is recommended for the daily care of every skin type, also dry skin and susceptible to drying due to various external factors. It brings good effects; if used after daily hygienic routines, it deeply moisturises the face and body skin, giving it a pleasant and long-lasting feeling of freshness and smoothness.
What else is worth knowing about the FAMILIJNY – SOFT daily face and body care cream?
• It was dermatologically tested
• It gently regulates skin oiling, making it soft and elastic
• It is easy to spread and absorbs quickly owing to the oil in water formula |
Holyjoe wrote:Work has begun on the stupidly-big and really rather unnecessary Asian Games stadium in Incheon:
So Munhak AND this white-elephant are going to sit there unused for the next 25 years? What a joke.
Korea really is going to go broke if they continue this reckless path of low-taxes AND the most wasteful spending imaginable.
For some reason I seem to recall reading about a World Cup stadium that could be demolished to make way for an apartment complex or two and the Munhak is ringing a few bells... maybe not though as they'd have to build a baseball stadium elsewhere in the city first having knocked down the Sungeui one (well they don't have to, they can always relocate the Wyverns). Had a quick Google to see if I was making this up and came across this article regarding a fiscal crisis at Incheon city government level from April 2012:
The city of Incheon has paid its civil servants one day late, blaming “a temporary lack of liquidity.†The delay in pay due to a deficit of 2 billion won (1.8 million U.S. dollars) is something not to be ignored given the city`s annual budget of 8 trillion won (7.1 billion dollars). The debt ratio of the Incheon City Hall by year`s end is expected to reach 40 percent. If the figure exceeds 40 percent, this will plunge the city into a debt crisis and prompt an audit by the central government. This is tantamount to a debt workout program for corporations.
Incheon became debt-saddled due to a host of reckless populist projects carried out under former mayor Ahn Sang-soo. Eunha Rail, which cost 85.3 billion won (75.5 million dollars), will be torn down due to poor construction. A free economic zone into which the city injected more than 1 trillion won (885 million dollars) has attracted few investors. The construction of the main stadium for the 2014 Asian Games, a venture needing more than 500 billion won (443 million dollars), has also come under scrutiny. If Incheon`s Munhak Stadium, which hosted games of the 2002 World Cup soccer finals, had been renovated, the city would have needed just 54 billion won (48 million dollars). This is in stark contrast to Daegu, which successfully hosted the IAAF World Championships in 2011 by refurbishing Daegu Stadium. |
1. Field of the Invention
The present invention relates to a motorcycle having a muffler assembly and a housing box resembling the muffler assembly, where the muffler assembly and the housing box are disposed parallel to each other in a balanced, substantially symmetrical manner at a rear portion of the motorcycle. More particularly, the present invention relates to motorcycle having the housing box arranged at least on one of a right side or a left side of a rear wheel, and attached to a rear portion of a body frame of the motorcycle, and a muffler assembly having a muffler forming a part of an exhaust system arranged on the other of the right or the left side of the rear wheel.
2. Description of the Background Art
There is a known motorcycle having a pair of right and left housing boxes, and a pair of right and left mufflers arranged on both sides of a rear wheel. An example of such motorcycle is disclosed in the Japanese Patent document JP-Y No. 1983-43508.
However, when configuration that each housing box is arranged on both sides of a rear wheel, such as disclosed in the Japanese Patent document JP-Y No. 1983-43508, is applied to a sport-type motorcycle, e.g., an off-road type motorcycle, the rear portion of the vehicle body and vicinity thereof undesirably becomes bulky.
Such arrangement of a plurality of housing boxes and mufflers results in a poor appearance quality and compromises correspondence to promptness and appearance for a sport-type motorcycle, such as an off-road type vehicle. Accordingly, a consideration for appearance quality and desired promptness (providing appropriate shape, e.g. an ergonomic shape, etc.) is required.
The present invention is made in view of such a situation. Accordingly, it is one of the objects of the present invention to prevent or at least minimize the vicinity of the rear of a vehicle body from being bulky, to secure sportive promptness, to also enhance appearance quality and to provide a motorcycle suitable for sports, such off road activities. |
798 F.2d 1515
255 U.S.App.D.C. 84
PEOPLE OF the STATE OF CALIFORNIA and the Public UtilitiesCommission of the State of California, Petitioners,v.FEDERAL COMMUNICATIONS COMMISSION and United States ofAmerica, Respondents,National Association of Broadcasters, Intervenor.
No. 85-1112.
United States Court of Appeals,District of Columbia Circuit.
Argued Feb. 24, 1986.Decided Aug. 22, 1986.
Ellen S. LeVine, with whom J. Calvin Simpson, San Francisco, Cal., was on brief, for petitioners. Gretchen Dumas, San Francisco, Cal., also entered an appearance for petitioners.
John E. Ingle, Counsel, F.C.C., with whom Jack D. Smith, Gen. Counsel, Daniel M. Armstrong, Associate Gen. Counsel, Roberta L. Cook, and Jane E. Mago, Counsel, F.C.C. and Robert B. Nicholson and Robert J. Wiggers, Attys., U.S. Dept. of Justice, Washington, D.C., were on brief, for respondents.
Mania K. Baghdadi, with whom Henry L. Baumann, Barry D. Umansky, Julian L. Shepard, and Thomas Schattenfield, Washington, D.C. were on brief, for intervenors.
Before BORK and BUCKLEY, Circuit Judges, and WRIGHT, Senior Circuit Judge.
Opinion for the court filed by Circuit Judge BUCKLEY.
BUCKLEY, Circuit Judge:
1
Domestic radio common carrier services are regulated under two separate headings within the Communications Act of 1934 ("the Act"). First, because such services are carried on radio waves, they come within Title III of the Act, which grants the Federal Communications Commission ("FCC" or "Commission") broad regulatory authority over radio transmission, whether interstate or intrastate. Second, because these are common carrier communications services, they also come within Title II of the Act, which grants the FCC authority over interstate communication. Regulation of intrastate common carriage (i.e., jurisdiction over charges, classifications, practices, services, facilities, and regulations generally) is reserved to the states. This case involves intrastate radio common carrier services, and presents the issue whether the Commission's Title III authority over the radio transmission aspects of such services can supersede the states' authority over their intrastate common carriage aspects.
2
Petitioners appeal an FCC order which, under claim of Title III authority, preempts state regulation of purely intrastate radio common carrier services provided on FM subcarrier frequencies, to the extent that such state regulation blocks or impedes entry of such services. For the reasons discussed below, we find that Title III does not authorize FCC preemption of state regulations governing intrastate radio common carriage. Because the Commission has exceeded its statutory authority, we reverse its Order insofar as it seeks preemption of state regulation of intrastate radio common carriage.
I.
3
The Communications Act of 1934 created the FCC with a mandate "to make available, so far as possible to all the people of the United States a rapid, efficient, Nation-wide, and world-wide wire and radio communication service with adequate facilities at reasonable charges." 47 U.S.C. Sec. 151. To accomplish this goal, the Act divides regulatory jurisdiction between federal and state authorities.
4
Under 47 U.S.C. Sec. 152(a), the FCC's jurisdiction extends "to all interstate and foreign communication by wire or radio ... and to all persons engaged within the United States in such communication ... and to the licensing and regulating of all radio stations." (Emphasis added.) On the other hand, 47 U.S.C. Sec. 152(b) reserves to the states jurisdiction over "charges, classifications, practices, services, facilities, or regulations for or in connection with intrastate communication service by wire or radio of any carrier." (Emphasis added.)
5
The reservation of state regulatory authority over intrastate communication is, however, made "[s]ubject to the provisions of [47 U.S.C.] section 301," id., which directs the Commission "to maintain the control of the United States over all the channels of radio transmission." Section 301 also provides that "[n]o person shall use or operate any apparatus for the [intrastate, interstate, or foreign] transmission of energy or communications or signals by radio ... except under and in accordance with this chapter and with a license in that behalf granted under the provisions of this chapter."
6
The states' authority over intrastate communication under section 152(b) is thus limited by the FCC's general jurisdiction over radio transmission under section 301. The essential dispute in this case concerns the scope of this limitation.
II.
7
The radio spectrum segment allotted to an FM licensee can be subdivided into a main channel and a number of "subchannels" or "subcarriers." Since 1960, FCC rules have allowed only broadcast services to be provided on such FM subchannels. Thus an FM licensee has not been allowed to use subchannels for common carrier services. In 1982, however, in accordance with its mandate to "[s]tudy new uses for radio, provide for experimental uses of frequencies, and generally encourage the larger and more effective use of radio in the public interest," 47 U.S.C. Sec. 303(g), the Commission initiated a rulemaking proceeding to consider eliminating restrictions on the use of FM subchannels. In its First Report and Order, 48 Fed.Reg. 28445, 53 Rad.Reg.2d (P & F) 1519 (published June 23, 1983), the Commission amended its rules to allow common carriage and other nonbroadcast services on FM subchannels.
8
Following the release of this First Report and Order, a number of parties filed Petitions for Reconsideration, complaining that even after a would-be radio common carrier has been licensed by the FCC, state regulations often impede actual entry. The petitions requested that the FCC preempt such state regulation of radio common carriage. In response to these petitions, the Commission released a Memorandum Opinion and Order, 49 Fed.Reg. 19659, 55 Rad.Reg.2d (P & F) 1607 (published May 9, 1984) ("Reconsideration Order "), in which it "preempt[ed] state regulation that has the effect of prohibiting or impeding entry of radio common carrier services operating on FM subcarriers." Id. at p 2. The Commission subsequently denied a motion to reconsider this preemption order, Memorandum Opinion and Order, FCC 84-531, 57 Rad.Reg.2d (P & F) 1683 (1985) ("Further Reconsideration Order ").
9
In its Reconsideration Order, the Commission recognized two categories of radio common carriage, and employed distinct rationales to justify preempting the regulation of each. First, the Commission dealt with common carriage services which form a component of an interstate communication system. The Commission reasoned that state entry regulation of such services might burden interstate communication. Id. at p 20. The FCC's authority to preempt state regulation of such services arises from its jurisdiction over interstate communication under section 152(a) and is not challenged here.
10
The Commission went on, however, to assert its authority to preempt state regulation of purely local radio common carriage services. Id. at paragraphs 21 et seq. Apparently recognizing that such preemption cannot be justified by its authority over interstate communication, the Commission relied instead on its authority under section 301 to "maintain the control ... over all the channels of radio transmission." As FCC counsel noted at oral argument, this is the first time the Commission has relied on its general authority over radio transmission under Title III of the Act in order to restrict state regulation of purely intrastate communication. The adequacy of Title III to support such preemption is an issue which we expressly reserved in Nat'l Ass'n of Regulatory Utility Com'rs v. FCC, 525 F.2d 630, 646 (D.C.Cir.1976), and is the central question presented for resolution here.
III.
11
The Commission found that state regulations frustrate its Title III mandate in three respects. First, state regulation often conflicts with a Commission decision to license a radio transmitter. 47 U.S.C. Sec. 307(a) directs that the Commission, "if public convenience, interest, or necessity will be served thereby, ... shall grant to any applicant therefor a station license provided for by this chapter." In accordance with this statutory directive, the Commission grants radio licenses only upon a finding that licensing the proposed service will serve the public interest. State regulations that prevent or delay the entry of an FCC licensee conflict with the Commission's determination of the public interest. Reconsideration Order at p 21.
12
Second, state regulations may restrict the beneficial utilization of the radio spectrum. The Commission has interpreted its section 301 mandate as an authorization to allocate the Nation's scarce radio spectrum resources and, therefore, to ensure that the additional spectrum made available through the liberalization of FM subchannel rules not be wasted. State regulations which impede entry frustrate the Commission's efforts to facilitate the utilization of the electromagnetic spectrum. Id. at p 22.
13
Finally, state regulations may hinder the Commission's efforts to introduce healthy competition into radio transmission industries. In conjunction with its duties to license transmitters and allocate the spectrum, the Commission has developed strongly pro-competitive policies. State regulations, however, are often expressly designed to shield existing common carriers from having to compete with new entrants, thus frustrating the FCC's efforts to encourage competition. Id. at p 23.
14
The Commission makes a persuasive case in support of its policy objective, but that case must be made to Congress and not to this court. The structure and legislative history of the Communications Act compel the conclusion that the Commission has here overstepped its statutory authority. The Act commits regulation of the common carrier aspects of intrastate radio transmission to the states. That such regulation impedes entry may well be an unfortunate consequence of Congress' division of regulatory jurisdiction between federal and state authorities, but only Congress may change that division of authority.
IV.
15
The appropriate resolution of this case is suggested in Louisiana Public Service Commission v. FCC, --- U.S. ---, 106 S.Ct. 1890, 90 L.Ed.2d 369 (1986). There, as in the instant case, the FCC attempted to preempt an element of state regulation of intrastate communication. The Supreme Court held this preemption barred by section 152(b)'s allocation of intrastate ratemaking authority to the states.
16
State utility commissions set intrastate telephone rates so as to allow telephone companies to recover their operating expenses and a reasonable return on investment. The calculation of both operating expenses and investment are significantly affected by the method of depreciating telephone plant and equipment. The depreciation methods used thus have an impact on intrastate telephone rates. The FCC, in reliance on its authority under 47 U.S.C. Sec. 220 to define depreciation methods, and its mandate under section 151 to make available a "rapid, efficient, Nation-wide" communication system, sought to prescribe the depreciation method to be used by the state commissions in setting rates for intrastate telephone service.
17
The Supreme Court reversed the FCC, reasoning that "an agency literally has no power to act, let alone preempt the validly enacted legislation of a sovereign state, unless and until Congress confers power upon it." Id. at 1901. The Court held that section 152(b) constitutes "a congressional denial of power to the FCC," id., which "fences off from FCC reach or regulation intrastate matters--indeed, including matters 'in connection with' intrastate service." Id. at 1899. The Act creates "a dual regulatory system," (emphasis in original), id., allocating jurisdiction between federal and state authorities, which the FCC may not subvert by inflating its authority under sections 220 and 151 at the expense of the states' authority under section 152(b). "[O]nly Congress can rewrite this statute." Id. at 1902.
18
In the instant case the FCC would preempt "state regulations that have the effect of prohibiting or impeding entry." Further Reconsideration Order at p 16. To justify such a preemption, despite the reservation to the states under section 152(b) of authority to make "regulations for or in connection with intrastate communication service by ... radio," the FCC relies on the language making that section "[s]ubject to the provisions of section 301." As the statutory scheme and legislative history make clear, however, this residuum of FCC authority under section 301 is much more limited than the Commission suggests.
A.
19
Section 152(b) reserves to the states authority to regulate intrastate wire or radio common carrier services. At the same time, the section is made subject to section 301, which grants the FCC authority over radio transmission. The obvious intent of this scheme is to divide the jurisdiction over intrastate radio common carriage services between state and federal authorities. States retain authority over the common carriage aspects of such services, while the FCC is authorized to regulate the radio transmission aspects. Section 301 does not empower the Commission to subvert this scheme by expanding its own authority at the expense of the states'.
20
The FCC represents that its action is "measured," Reconsideration Order at p 2, and that it is preempting only so much of state regulation as impedes entry, but will leave other aspects of state common carrier regulation untouched. Id. at p 26 n. 24, & p 28 n. 31. This asserted restraint, however, seems belied by the logic of the Commission's arguments. The rationales by which the Commission would justify this preemption prove too much, suggesting a wholesale displacement of state regulation.
21
Any state regulation of radio common carriage might in some respect burden entry. Moreover, any and all state regulation might trigger the three rationales by which the FCC would justify preemption of additional areas of state authority; i.e. conflict with the Commission's licensing determination, frustration of beneficial use of spectrum resources, or impediment to the introduction of competition into radio communication industries. The Commission's logic would thus prepare the way for the complete elimination of any state role in the regulation of intrastate radio common carriage. Yet, such a result would reduce section 152(b) to a nullity, violating the congressional intent to establish a system of dual regulatory control, Louisiana Public Service Commission, 106 S.Ct. at 1899, and to "fence[ ] off from FCC reach or regulation intrastate matters." Id.
B.
22
The legislative history of the Act further supports the conclusion that the FCC has overstepped its legitimate authority. In 1954, Congress amended section 152(b) "to make certain that the use of radio will not subject to Federal regulation companies engaged primarily in intrastate operations." H.R.Rep. No. 910, 83d Cong., 1st Sess. 1 (1953), U.S.Code Cong. & Admin.News 1954, 2133. The Commission's attempted preemption would subject intrastate common carrier services to federal control on the sole basis that they utilize radio signals. This result is precisely what Congress sought to foreclose with the 1954 amendment.
23
Also instructive is the simultaneous 1954 amendment of 47 U.S.C. Sec. 221(b). That section was amended to ensure that local telephone exchange services would not be subjected to federal regulation simply because they incorporated radio services. In comments to the House committee, the Commission successfully argued that the statute also be made "subject to the provisions of section 301."
24
Such a provision, which is presently included in section [152(b) ] of the act, is desirable in order to avoid any implication that the radio stations to which the section would have reference, would not be subject to the general radio regulatory provisions of title III of the act. The possibility that such radio operations, left unregulated, would cause destructive interference with other interstate radio operations makes essential that this Commission retain jurisdiction over the noncommon carrier regulatory aspects of the radio stations involved.
25
Id. at 5. Thus, the Commission interpreted the phrase borrowed from section 152(b)--"subject to the provisions of section 301"--as allowing FCC control only of the technical, non-common-carrier regulatory aspects of radio transmission, e.g., prevention of destructive interference. The Commission's interpretation bolsters our own conclusion that the phrase will not support the present effort to preempt state regulation of the common carrier aspects of intrastate radio communication.
V.
26
It is true that Title III of the Act gives the FCC regulatory authority over more than the technical and engineering aspects of radio transmission. As the Supreme Court held in National Broadcasting Co. v. United States, 319 U.S. 190, 215, 63 S.Ct. 997, 1009, 87 L.Ed. 1344 (1942), the Commission is not merely "a kind of traffic officer, policing the wave lengths to prevent stations from interfering with each other," but in addition may take public interest considerations into account in deciding whether to grant broadcast licenses. Nevertheless, whatever the extent of the Commission's Title III authority, it is limited to the non -common carrier aspects of intrastate radio communication. The unavoidable conclusion from the structure and legislative history of the Act is that section 301 does not authorize the Commission to preempt state regulation of intrastate radio common carriage merely because these regulations may frustrate the entry of FCC licensees.
27
Whatever the merit of the Commission's policy arguments for unimpeded entry and free market competition in order to facilitate the beneficial utilization of scarce spectrum resources, the attempted preemption of state regulation in this case contravenes section 152(b). Public interest considerations may well favor changing the present rules and allowing more complete FCC control over intrastate radio common carriage. This decision, however, must be made by Congress, not by the FCC, and not by the courts.
28
For the reasons stated above, the Commission's Further Reconsideration Order is reversed insofar as it seeks to preempt state regulation of purely intrastate radio common carriage.
29
It is so ordered.
|
# Why choose PHP?
## PHP compared to other programming languages
A completely normal question to ask yourself when starting a project is which
technologies to use.
Some of the strengths of PHP:
* Good speed and performance.
* Simplicity and the ability to develop complex applications.
* Very vibrant, large, and diverse community.
* Active, updated, and detailed manual.
* A wide selection of out-of-the-box, popular, and production ready open source
solutions such as content management and e-commerce systems, CRMs,
frameworks, and components and libraries for building applications from
scratch.
* PHP is used by [82.1%](https://w3techs.com/technologies/overview/programming_language/all)
of all the websites whose server-side platform could be measured.
## See also
If you're still not convinced just yet, please also check some of these other
resources on this topic:
* [Why choose PHP over alternatives](http://www.sitepoint.com/why-choose-php/) -
Why should a developer choose PHP for new projects, rather than an
alternative language?
|
Q:
Bootstrap estimate for standard error in linear regression
I came across the bootstrap concept in the book Introduction to statistical learning, wherein the standard error for the linear regression coefficients is estimated both by the formula and the bootstrap process, and then following this paragraph (page 196):
Now although the formula for the standard errors do not rely on the linear model being correct, the estimate for $\sigma^2$ does. We see [...] that there is a non-linear relationship in the data, and so the residuals from a linear fit will be inflated, and so will $\hat\sigma^2$. [...] The bootstrap approach does not rely on any of these assumptions, and so it is likely giving a more accurate estimate of the standard errors of $\hat\beta_0$ and $\hat\beta_1$ than is the summary() function. [Emphasis added.]
So my question is why are the assumptions reducing the reliability or accuracy of the estimates? Because more is the residual error more is your standard error of estimates (indirectly due to inflated $\hat\sigma^2$) this assumption doesn't seem wrong to me.
A:
Sure a worse fit gives larger residuals, which gives a larger standard error estimate. But this is not why we compute the standard error estimate.
If all you care about is fit, you don't need to bother with the standard error of $\hat \beta$ at all. Just use $\hat\sigma^2$ directly, which is the MSE of your model. We use $\text{s.e}(\hat \beta)$ for inference: to say something about how well we have estimated $\beta$. In short to construct confidence intervals around our point estimate.
If we want to trust these intervals and their relation to the population of $\beta$s, $\text{s.e.}(\hat\beta)$ should be correct. It should be the standard deviation of whatever distribution $\hat \beta$ has. If the model is specified correctly, we can use the standard formulas to estimate $\text{s.e.}(\hat\beta)$ directly, and we know exactly which properties $\hat\beta$ has. These properties and formulas — and hence our inferences about $\hat\beta$ — are directly derived from the model assumptions.
If the model isn't correctly specified, all our beautiful and clean theory goes out the window.
Elsewhere in the ISLR book you can read that an approximate 95% confidence interval for $\hat \beta$ is
$$[\hat\beta - 2\cdot\text{s.e.}(\hat\beta), \hat\beta + 2\cdot\text{s.e.}(\hat\beta)].$$
This is true if you have a good standard error estimate, but if the estimate is too small/large, the confidence interval is too tight/wide. You can no longer have 95% confidence in your 95% confidence interval.
A simulation study
Below is an illustration in code and figures. The examples in ISLR use some data that look quadratic. I will simulate some data so that we know what the truth is. My true model is $y = 4 + 5x -3x^2 + \epsilon$, where $\epsilon \sim N(0,1)$. This is classic linear regression, the big assumption is that errors should conditional on $x$ be iid from a normal distribution with mean zero. A quadratic model is the perfect fit. A linear model is a poor fit.
The figure below shows some simulated data in grey, the true model in black, and a fitted linear regression in red. The errors are not mean-zero normal conditional on $x$: they are consistently below zero to the right and to the left, and consistently above zero in the middle.
library(boot)
library(plyr)
set.seed(22042017) # for reproducibility
generate_data <- function(nsamples=100) {
x <- rnorm(nsamples,mean=.75, sd=.5)
y <- 4 + 5*x -3*x^2 + rnorm(length(x), mean=0, sd = 1)
data.frame(x,y)
}
dat <- generate_data()
plot(dat, pch=20, col="grey")
curve(4 + 5*x -3*x^2, add=T, lwd=1.5)
abline(lm(y~x, data=dat), col="red", lwd=1.5)
To explore the behavior of a bootstrap estimate of s.e. as compared to the standard parametric estimate I have included a small simulation. First I generate a data set similar to above, I then estimate standard error for the coefficient of $x$ with both the parametric assumptions in lm() and with the bootstrap. This gives us a i) distribution over how the standard estimate behaves here and ii) a distribution over how the bootstrap estimate behaves. I also calculate the "true" s.e. of $\hat \beta_x$ by repeatedly generating data and calculating the beta. I can then take the standard deviation of all these betas as the truth.
# for the bootstrap
bootfun <- function(data, index) {
coef(lm(y~x, data=dat, subset = index))
}
# simulation: compare
experiment <- plyr::raply(1000, {
dat <- generate_data()
sig_lm <- coef(summary(lm(y~x, data=dat)))[2, 2]
sig_boot <- sd(boot(dat, bootfun, 100)$t[, 2])
c(lm=sig_lm, boot=sig_boot)
})
# The "real" s.e. of beta estimates
sampling <- raply(10000, function() {
dat <- generate_data()
coef(lm(y~x, data=dat))[2]
})
truth <- sd(sampling)
d_lm <- density(experiment[, 1])
d_bt <- density(experiment[, 2])
xl <- range(d_lm$x, d_bt$x)
yl <- range(d_lm$y, d_bt$y)
plot(d_lm, xlim=xl, ylim=yl)
lines(d_bt, lty=2)
abline(v=truth, col="red")
Created on 2019-10-25 by the reprex package (v0.2.1)
Standard estimate is the solid line, bootstrap is the dashed line, in red we see the truth. The standard estimate greatly underestimates the and the bootstrap somewhat underestimates. The bootstrap gets much closer on average and at least some times is in the right area.
|
Q:
how to read data from clipboard and pass it as value to a variable in python?
how to read data from clipboard and pass it as value to a variable in python?
For example:
I will copy some data {eg: 200} by pressing ctrl+c or through rightclick. and pass it to a variable.
c = 200
..can any1 tel me how to do this?
A:
To read from clipboard in your script with tkinter is this easy:
try:
# Python2
import Tkinter as tk
except ImportError:
# Python3
import tkinter as tk
root = tk.Tk()
# keep the window from showing
root.withdraw()
# read the clipboard
c = root.clipboard_get()
A:
Just put this script in your path somewhere, say in your project folder, then;
import pyperclip # The name you have the file
x = pyperclip.paste()
|
A comparison of intergestural patterns in deaf and hearing adult speakers: implications from an acoustic analysis of disyllables.
Coarticulation studies in speech of deaf individuals have so far focused on intrasyllabic patterning of various consonant-vowel sequences. In this study, both inter- and intrasyllabic patterning were examined in disyllables /symbol see text #CVC/ and the effects of phonetic context, speaking rate, and segment type were explored. Systematic observation of F2 and durational measurements in disyllables minimally contrasting in vocalic ([i], [u,][a]) and in consonant ([b], [d]) context, respectively, was made at selected locations in the disyllable, in order to relate inferences about articulatory adjustments with their temporal coordinates. Results indicated that intervocalic coarticulation across hearing and deaf speakers varied as a function of the phonetic composition of disyllables (b_b or d_d). The deaf speakers showed reduced intervocalic coarticulation for bilabial but not for alveolar disyllables compared to the hearing speakers. Furthermore, they showed less marked consonant influences on the schwa and stressed vowel of disyllables compared to the hearing controls. Rate effects were minimal and did not alter the coarticulatory patterns observed across hearing status. The above findings modify the conclusions drawn from previous studies and suggest that the speech of deaf and hearing speakers is guided by different gestural organization. |
Former New York Jet Muhammad Wilkerson was arrested in New Jersey for driving while intoxicated and drug offenses, state police said.
Wilkerson, 30, was charged with DWI, possession of marijuana and possession of drug paraphernalia at 2:45 a.m. Monday while driving westbound on I-80 in Paterson, a New Jersey State Police spokesman told The Post.
A passenger in Wilkerson’s vehicle, Jihad Ballard, 28, of Hillside, New Jersey, was also arrested on charges of possession of marijuana and possession of drug paraphernalia.
Both Wilkerson and Ballard were released pending a court date, Trooper Alejandro Goez said.
The defensive lineman who last played for the Green Bay Packers in 2018 pleaded guilty in September to driving while impaired in Manhattan and received a $500 fine. He agreed to a three-month suspension of his license as a part of a plea deal in Manhattan Criminal Court.
The former first-round pick by the Jets in 2011 was arrested June 1 while behind the wheel near Riverside Drive and West 168th Street in Washington Heights. Cops spotted him with bloodshot, watery eyes and he reeked of alcohol, according to a criminal complaint.
“I had one shot and two beers,” Wilkerson, who had a blood-alcohol level of 0.09, allegedly told police.
Wilkerson, of Linden, signed a five-year, $86 million contract with the Jets in 2016, only to be released two years later after earning $37 million. He signed with Green Bay prior to the 2018 season after seven years with the Jets. He only played in three games, however, before a season-ending ankle injury. He remains a free agent. |
// SPDX-License-Identifier: GPL-2.0-only
/**
* Routines supporting VMX instructions on the Power 8
*
* Copyright (C) 2015 International Business Machines Inc.
*
* Author: Marcelo Henrique Cerri <[email protected]>
*/
#include <linux/module.h>
#include <linux/moduleparam.h>
#include <linux/types.h>
#include <linux/err.h>
#include <linux/cpufeature.h>
#include <linux/crypto.h>
#include <asm/cputable.h>
#include <crypto/internal/hash.h>
#include <crypto/internal/skcipher.h>
extern struct shash_alg p8_ghash_alg;
extern struct crypto_alg p8_aes_alg;
extern struct skcipher_alg p8_aes_cbc_alg;
extern struct skcipher_alg p8_aes_ctr_alg;
extern struct skcipher_alg p8_aes_xts_alg;
static int __init p8_init(void)
{
int ret;
ret = crypto_register_shash(&p8_ghash_alg);
if (ret)
goto err;
ret = crypto_register_alg(&p8_aes_alg);
if (ret)
goto err_unregister_ghash;
ret = crypto_register_skcipher(&p8_aes_cbc_alg);
if (ret)
goto err_unregister_aes;
ret = crypto_register_skcipher(&p8_aes_ctr_alg);
if (ret)
goto err_unregister_aes_cbc;
ret = crypto_register_skcipher(&p8_aes_xts_alg);
if (ret)
goto err_unregister_aes_ctr;
return 0;
err_unregister_aes_ctr:
crypto_unregister_skcipher(&p8_aes_ctr_alg);
err_unregister_aes_cbc:
crypto_unregister_skcipher(&p8_aes_cbc_alg);
err_unregister_aes:
crypto_unregister_alg(&p8_aes_alg);
err_unregister_ghash:
crypto_unregister_shash(&p8_ghash_alg);
err:
return ret;
}
static void __exit p8_exit(void)
{
crypto_unregister_skcipher(&p8_aes_xts_alg);
crypto_unregister_skcipher(&p8_aes_ctr_alg);
crypto_unregister_skcipher(&p8_aes_cbc_alg);
crypto_unregister_alg(&p8_aes_alg);
crypto_unregister_shash(&p8_ghash_alg);
}
module_cpu_feature_match(PPC_MODULE_FEATURE_VEC_CRYPTO, p8_init);
module_exit(p8_exit);
MODULE_AUTHOR("Marcelo Cerri<[email protected]>");
MODULE_DESCRIPTION("IBM VMX cryptographic acceleration instructions "
"support on Power 8");
MODULE_LICENSE("GPL");
MODULE_VERSION("1.0.0");
|
A time- and angle-resolved photoemission spectroscopy with probe photon energy up to 6.7 eV.
We present the development of a time- and angle-resolved photoemission spectroscopy based on a Yb-based femtosecond laser and a hemispherical electron analyzer. The energy of the pump photon is tunable between 1.4 and 1.9 eV, and the pulse duration is around 30 fs. We use a KBe2BO3F2 nonlinear optical crystal to generate probe pulses, of which the photon energy is up to 6.7 eV, and obtain an overall time resolution of 1 ps and energy resolution of 18 meV. In addition, β-BaB2O4 crystals are used to generate alternative probe pulses at 6.05 eV, giving an overall time resolution of 130 fs and energy resolution of 19 meV. We illustrate the performance of the system with representative data on several samples (Bi2Se3, YbCd2Sb2, and FeSe). |
Stress in black, low-income, single-parent families: normative and dysfunctional patterns.
Stressful life events and the effects of demographic and social network variables were explored in a study of 50 clinic-referred and 76 nonclinic, black, low-income, single-parent families. Dysfunctional families evidenced greater stress and social network characteristics were not significant mediators. The family's internal resources may be the most important buffer against stress. |
Colby Tenggren succeeds her father as owner and publisher of the weekly Katahdin and Lincoln Lakes region newspaper and reporter Chris DeBeck is the newspaper’s acting editor, said David Whalen, the newspaper’s general manager.
The changes should not have much immediate impact on the newspaper’s appearance, Whalen said.
“The News will still be functioning and working on staying solvent and doing good news reporting,” Whalen said.
Story continues below advertisement.
The body of Tenggren, 46, was found at his home in Lincoln on June 17. He apparently suffered some kind of internal bleeding, Whalen has said.
Tenggren had run the newspaper, which has a circulation of 6,300, since 2005. He succeeded his mother, Sheila Tenggren, who acquired the Lincoln News in 1981 after the death of her fiance.
Tenggren was an award-winning journalist, capturing a first-place award from the Maine Press Association for his coverage of a downtown fire. He oversaw an editorial staff of three reporters, typically laying out most of the newspaper by himself and writing stories.
The newspaper is looking to hire a reporter, partly to help take some of the workload from DeBeck, the newspaper’s primary news and sports reporter and photographer, Whalen said.
The News will also go beyond its present website, which advertises the newspaper and its full-service printing and design facility, Lincoln News Print Services, but Whalen declined to say exactly how that would happen. |
[The bactericidal power of antibiotic combinations. Application in the treatment of osteo-articular infections due to Staphylococcus aureus (author's transl)].
Study of the bactericidal power of antibiotic combinations against 18 strains of staphylococcus aureus causing osteoarthritis showed that the combinations most often synergistic or indifferent were: rifampicin + lincomycin or synergistine, rifampicin + fusidic acid, synergistine + fusidic acid or trimethoprim-sulphamethoxazole, cephalosporins + gentamycin, rifampicin or fusidic acid + gentamycin, trimethoprim-sulphamethoxazole + rifampicin or fusidic acid. Study of the antibiotic therapy used here was based upon the inhibitory power of serum and the measurement of antibiotic concentrations in healthy bone. Combinations which are synergistic or indifferent in vitro endow the serum with a high level of bactericidal activity. Certain antagonisms (cephalosporins or penicillin M + rifampicin) found in vitro may be reflected neither clinically nor in study of the inhibitory power of the serum. |
The proposed research will examine the role of Ca2+-dependent cadherin mediated cell-cell adhesion in the induction of prolactin (PRL) gene expression. There are three general aims: 1. Cadherin expression in GH3 cells. We have preliminary data for multiple cadherin expression in GH3 cells. This work will be extended in order to confirm our preliminary findings, as well as to generate full length cDNA clones and specific antibodies. The specific aims are: 1. Cloning and sequencing of PCR- generated fragments of rat N-cadherin, E-cadherin, and P-cadherin from GHG3 cell cDNA in order to confirm their identity. 2. Use of these partial cDNA clones as probes to examine cadherin expression in GH3 cells by Northern blot. 3. Isolation of full length cDNA clones for those cadherins expressed in GH3 cells. 4. Use of sequence information to generate specific antibodies against rat expressed in GH3 cells. This will be done on a contractural basis. 5. Use of specific cadherin antibodies to examine cadherin protein expression and localization in GH3 cells and related pituitary tumor cell lines. II. Effects of experimentally induced disruption of cell-cell adhesion on PRL gene expression. We have reproducibly observed a close correlation between CaCl2-induced cell-cell adhesion and CaCl2-induced PRL gene expression in GH3 cells. We propose to utilize experimentally induced inhibition or disruption of cell-cell contacts for the purpose of examining the requirement of cell-cell adhesion in the CaCl2 induction of PRL gene expression. Cell-cell adhesion will be inhibited or disrupted in the following ways: 1. Introduction by stable transfection of an N-cadherin gene containing a large deletion of the extracellular domain. Based on previous work with this gene, it is expected to behave as a dominant negative mutant cadherin gene, which will disrupt the ability of endogenous cadherins to form cell-cell junctions. 2. Competitive inhibition of the homophilic binding site by introduction of peptides corresponding to the homophilic binding site of the extracellular domain. 3. Effectively increasing c=src activity, since c-src phosphorylates cadherins and associated proteins, and induces the disassembly of adherins junctions. III. Examination of cadherin expression and function in the pituitary gland. We propose examine of cadherin function in the normal pituitary gland. This section has two specific aims: 1. Expression of cadherins in adult and fetal rat pituitaries and; 2 Effect of a dominant negative cadherin mutation that is targeted to lactotrophs in transgenic mice on lactotrope abundance and position within pituitary, and on content of pituitary PRL. The proposed research represents the first examination of cadherin function in the pituitary gland, both in terms of its morphogenesis and of the differentiated function of lactotropes. These studies may provide the first demonstration of a role for cadherins in the expression of a specific hormone. Since cadherins have tumor suppressor activity, future work may also reveal a role for cadherins in the control of estrogen-induced proliferation of lactotropes. |
Hogs Back seasonal celebrates love of cycling
Hogs Back Brewery is launching a seasonal ale that celebrates the British love of cycling, as well as marking the brewer’s support for the annual Farnham Bike Ride charity event.
Biker is a light, refreshing, golden beer with floral and citrus hints, and is big on flavour, despite having an ABV of just 3.4%. Brewed with Aramis aroma hops from France and American Amarillo hops, Biker reflects the growing consumer trend for lighter, mid-strength craft beers that provide refreshment and flavour with a lower alcohol content.
Competitors in the Farnham Bike Ride, on Sunday, July 2, will be able to enjoy a free sample of Biker from the Hogs Back pop-up bar at the end of the course. The cycle ride, organised by Farnham Round Table, includes a range of routes, from a relatively gentle 16-mile circuit to a more gruelling 75-mile sportive.
Among the riders will be a three-strong team from Hogs Back Brewery: Liam Davies, Andrew Thompson and Nigel Hyde. Hogs Back will be sponsoring them to finish the ride with a donation to Mind, which is the beneficiary of the company’s charitable trust for the year.
Rupert Thompson, managing director of Hogs Back Brewery, sad: “We are very well known around Farnham for the customised Hogs Back Brewery motorcycle and sidecar, but with Biker we are celebrating the popularity of pedal power. It’s a great summer ale for a great summer pastime.
“We’re delighted to be supporting the Farnham Bike Ride, which is a hugely popular local event and raises much-needed funds for good causes. As Farnham’s local brewer, we enjoy meeting our friends and neighbours at events such as the Bike Ride, and we are looking forward to cheering on the Hogs Back team!”
Biker is part of Hogs Back Brewery’s seasonal cask ale programme and will be available to pubs throughout July, as well as on draught to take away from the Hogs Back shop at the brewery in Tongham. |
/ What we did
Digital PR
Uncle Tetsu Unionville
Objective – To promote the new Sakura Cake from Uncle Tetsu. Maximize exposure and increase sales
Tactics – Setting up special photo stations for bloggers & Instagrammers to take photos; Invite bloggers to feature the cake; Collaboration with Yelp on a Check in & Check out Yelp elite pop up event; Hosted giveaway with Instagrammer, Toronto Gourmand Club and own Facebook channel
Results – Over 50 mentions on IG and increased sales of the Sakura cake by 300% |
Pages
Tuesday, 5 August 2014
Review: STUBBORN - Jeanne Arnold
This book reminded me of a plot for a really great teen drama that the WB would run with a cast of truly beautiful people and a snappy dialogue a la Dawson’s Creek, although without the need for a pocket dictionary or thesaurus to understand the lingo. The really great thing about Stubborn was I wasn’t just enamoured with our male and female lead in the book but the various characters that make up the cast of Stubborn as well, each bringing a vital element of drama or angst to the story and often a good dose of humour. It is by no means a complex or heavy read but a perfect book for the beach. Stubborn is able to straddle the line of YA/NA appealing to both the younger reader’s and the other camp that are similar to my age- just slightly older than, er… 25. The book just reads like a really good soap opera.
Avery our leading lady is the unlucky soul who woke up one fateful morning with obscenities scrawled on her forehead by a rejected would-be boyfriend only to be shipped off by her parents to the wilds of Dakota to her former-military aunt Meggie’s home. Once there Avery becomes entangled in the lives of the Halden men, three handsome brother’s each with their own individual personalities but are weighted down by a lifetime of emotional baggage due to a devastating accident having occurred in the family relatively recently.
Stubborn mostly centres round Avery and Gabe Halden and tells their tale of growing-up, opening-up their hearts to each other, dealing with family crises and working their way to a HEA but not before a few obstacles are threw in their way- namely their own obstinate views on things and learning that not everything is so black and white (hence the books’ title) and the drama-rama that comes from a rival oil tycoon’s son and Gabe’s playboy brother Caleb. A thoroughly enjoyable and well written book, Stubborn had a healthy mix of everything drama, romance and engaging character’s that you’ll either love or love to hate. I honestly hope there is another episode in this saga- I mean book- to give Caleb and Lane their time to shine and tell their stories.
STUBBORN
With a train ticket, a bad attitude, and an unfortunate scribbling of obscenities across her forehead, seventeen-year-old Avery Ross is tossed out of the frying pan and into the fire when she’s sent from New York to the vast oil field region of North Dakota. When a green-eyed boy with a sultry Texan accent comes to her defense, Avery has no clue that his actions will lead her into a passion-charged summer, full of temptation and loss.
Defiant and relegated to work at her aunt’s boarding house, Avery discovers a connection between her aunt and the striking boy. He and his brothers are seeking revenge for the wrongful death of their sibling, and Avery becomes entangled in their battle over oil rights, loyalty, and love. Avery falls for the brooding, younger brother, Gabriel Halden, against her aunt’s forewarnings and creates more tribulations than any of them could anticipate. |
X Privacy & Cookies This site uses cookies. By continuing, you agree to their use. Learn more, including how to control cookies. Got It!
Advertisements
Hungary’s Ministry of Foreign Affairs and Trade summoned David Kostelancik, charge d’affaires at the United States’ embassy in Budapest, after the US State Department launched a media fund for rural media outlets in Hungary, RTL Klub reported.
The 700.000 USD program’s “goal is to support media outlets operating outside the capital in Hungary to produce fact-based reporting and increase their audience and economic sustainability. The program should increase citizens’ access to objective information about domestic and global issues of public importance, by enhancing local media’s ability to engage a larger audience, including their print, multimedia, and online readership”, according to the State Department’s recent announcement.
The ministry told RTL Klub that Kostelancik was summoned to give explanation. With the upcoming elections in 2018, the Hungarian goverment considers the State Department’s announcement as “intervention into Hungarian domestic politics”.
Group leader of the ruling Fidesz party, Gergely Gulyas was asked about the State Department’s plans to support the media in the Hungarian provinces. He said that it was “an attempt to interfere with Hungary’s affairs” and added that similar foreign attempts would not be tolerated by the US political elite, no matter where the money comes from.
Kostelancik was summoned to the ministry in October, following his remarks about the “worrying” state of press freedoms in Hungary.
Hungary Journal |
Uniform Generation of Sub-nanometer Silver Clusters in Zeolite Cages Exhibiting High Photocatalytic Activity under Visible Light.
Sub-nanometer silver clusters that exhibit discrete electronic structure with molecular-like properties are highly desirable in various technologies. However, the methods for their preparation suffer from limitations related with the reproducibility and particles uniformity and/or the possibility of the scale-up. Another critical drawback is that free sub-nanometer silver clusters tend to aggregate into larger particles. In this work, a new approach that successfully overcomes the above limitations is developed. It allows, for the first time, an ultrafast preparation of sub-nanometer silver particles with high abundance, uniformity (7 Å), and stability into the cages of nanosized zeolite crystals. The new method consists of UV excitation of a water suspension of nanozeolite containing photoactive vanadate clusters in the presence of ethanol (as an electron donor) and silver precursor. The characteristic features of sub-nanometer silver particles are presented, and the mechanism of their formation is discussed. Sub-nanometer Ag clusters exhibit exceptional photocatalytic activity and selectivity in the reforming of formic acid to H2 and CO2 under visible light. |
Article content
Homeowners moving into Edmonton’s new suburbs should be asked to pay more for fire stations, new interchanges and facilities such as the Lewis Farms Recreation Centre in this upcoming budget, Mayor Don Iveson said Tuesday.
He laid out the five principles he’ll bring to this fall’s budget debate and said Edmonton’s existing business owners and residents can’t be asked to cover the roughly $1 billion it would take to provide services for the new areas planned and under construction.
We apologize, but this video has failed to load.
tap here to see other videos from our team. Try refreshing your browser, or Don Iveson calls for Edmonton suburbs to pay more in next budget Back to video
“We do need a new way forward,” he said, responding to loud calls from business leaders to a limit in the property tax increase. “I’m squaring the circle.”
“Growth … with the right formula in place, should indeed pay for itself,” he said. “It’s no longer fair and justifiable for me to go to a business owner on Fort Road and say, you have to bear as much of the cost of a new interchange on the Terwillegar as everyone else.” |
Q:
Is it possible to have non-trainable layer in Keras?
I would like to calculate constant convolution like blurring or resampling and want it never change during training.
Can I initialize convolution kernel to constant and exclude it from training in Keras?
More specifically, I don't want to use this for purposes declared in the doc. I want to implement residual network this way: one branch does normal trainable convolution, while parallel branch does something constant, like averaging.
A:
You should be able to pass a trainable = False argument to your layer definition, or set the layer.trainable = False property after creating your layer. In the latter case you need to compile after the fact. See the FAQ here.
You can then set constant weights for the layer by passing a kernel_initializer = initializer argument. More information on initializers can be found here. If you have a weight matrix already defined somewhere, I think you will need to define a custom initializer that sets the weights to your desired values. The link shows how to define custom initializers at the bottom. Something as simple as the following might work, assuming you have my_constant_weight_matrix defined:
def my_init(shape, dtype=None):
# Note it must take arguments 'shape' and 'dtype'.
return my_constant_weight_matrix
model.add(Conv2D(..., kernel_initializer=my_init)) # replace '...' with your args
That said, I have not verified, and when I did a Google search I saw a lot of bug reports pop up about layer freezing not working correctly. Worth a shot though.
|
{
"properties": {
"displayName": "Windows machines should meet requirements for 'Security Options - System settings'",
"policyType": "BuiltIn",
"mode": "Indexed",
"description": "Windows machines should have the specified Group Policy settings in the category 'Security Options - System settings' for certificate rules on executables for SRP and optional subsystems. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol.",
"metadata": {
"category": "Guest Configuration",
"version": "2.0.0",
"requiredProviders": [
"Microsoft.GuestConfiguration"
],
"guestConfiguration": {
"name": "AzureBaseline_SecurityOptionsSystemsettings",
"version": "1.*",
"configurationParameter": {
"SystemSettingsUseCertificateRulesOnWindowsExecutablesForSoftwareRestrictionPolicies": "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies;ExpectedValue"
}
}
},
"parameters": {
"IncludeArcMachines": {
"type": "string",
"metadata": {
"displayName": "Include Arc connected servers",
"description": "By selecting this option, you agree to be charged monthly per Arc connected machine."
},
"allowedValues": [
"true",
"false"
],
"defaultValue": "false"
},
"SystemSettingsUseCertificateRulesOnWindowsExecutablesForSoftwareRestrictionPolicies": {
"type": "string",
"metadata": {
"displayName": "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies",
"description": "Specifies whether digital certificates are processed when software restriction policies are enabled and a user or process attempts to run software with an .exe file name extension. It enables or disables certificate rules (a type of software restriction policies rule). For certificate rules to take effect in software restriction policies, you must enable this policy setting."
},
"defaultValue": "1"
},
"effect": {
"type": "string",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of this policy"
},
"allowedValues": [
"AuditIfNotExists",
"Disabled"
],
"defaultValue": "AuditIfNotExists"
}
},
"policyRule": {
"if": {
"anyOf": [
{
"allOf": [
{
"field": "type",
"equals": "Microsoft.Compute/virtualMachines"
},
{
"anyOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"in": [
"esri",
"incredibuild",
"MicrosoftDynamicsAX",
"MicrosoftSharepoint",
"MicrosoftVisualStudio",
"MicrosoftWindowsDesktop",
"MicrosoftWindowsServerHPCPack"
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "MicrosoftWindowsServer"
},
{
"field": "Microsoft.Compute/imageSKU",
"notLike": "2008*"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "MicrosoftSQLServer"
},
{
"field": "Microsoft.Compute/imageOffer",
"notLike": "SQL2008*"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "microsoft-dsvm"
},
{
"field": "Microsoft.Compute/imageOffer",
"equals": "dsvm-windows"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "microsoft-ads"
},
{
"field": "Microsoft.Compute/imageOffer",
"in": [
"standard-data-science-vm",
"windows-data-science-vm"
]
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "batch"
},
{
"field": "Microsoft.Compute/imageOffer",
"equals": "rendering-windows2016"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "center-for-internet-security-inc"
},
{
"field": "Microsoft.Compute/imageOffer",
"like": "cis-windows-server-201*"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "pivotal"
},
{
"field": "Microsoft.Compute/imageOffer",
"like": "bosh-windows-server*"
}
]
},
{
"allOf": [
{
"field": "Microsoft.Compute/imagePublisher",
"equals": "cloud-infrastructure-services"
},
{
"field": "Microsoft.Compute/imageOffer",
"like": "ad*"
}
]
},
{
"allOf": [
{
"anyOf": [
{
"field": "Microsoft.Compute/virtualMachines/osProfile.windowsConfiguration",
"exists": "true"
},
{
"field": "Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType",
"like": "Windows*"
}
]
},
{
"anyOf": [
{
"field": "Microsoft.Compute/imageSKU",
"exists": "false"
},
{
"allOf": [
{
"field": "Microsoft.Compute/imageSKU",
"notLike": "2008*"
},
{
"field": "Microsoft.Compute/imageOffer",
"notLike": "SQL2008*"
}
]
}
]
}
]
}
]
}
]
},
{
"allOf": [
{
"value": "[parameters('IncludeArcMachines')]",
"equals": "true"
},
{
"field": "type",
"equals": "Microsoft.HybridCompute/machines"
},
{
"field": "Microsoft.HybridCompute/imageOffer",
"like": "windows*"
}
]
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.GuestConfiguration/guestConfigurationAssignments",
"name": "AzureBaseline_SecurityOptionsSystemsettings",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.GuestConfiguration/guestConfigurationAssignments/complianceStatus",
"equals": "Compliant"
},
{
"field": "Microsoft.GuestConfiguration/guestConfigurationAssignments/parameterHash",
"equals": "[base64(concat('System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies;ExpectedValue', '=', parameters('SystemSettingsUseCertificateRulesOnWindowsExecutablesForSoftwareRestrictionPolicies')))]"
}
]
}
}
}
}
},
"id": "/providers/Microsoft.Authorization/policyDefinitions/12017595-5a75-4bb1-9d97-4c2c939ea3c3",
"name": "12017595-5a75-4bb1-9d97-4c2c939ea3c3"
} |
Alright, several people have asked me why I haven’t weighed in on the current “devops” movement. Mostly because no two people can absolutely agree on what DevOps is. I’m outside of that particular community, although I read a lot of the blogs of the key members, so maybe I’m in a good position to comment on my perspective.
First, lets define DevOps. If you strip away all of the touchy-feely stuff that gets associated with the name, at its core, DevOps is an increased interaction and interdependency between developers and operations staff, whether that operations staff is specifically system administrators or whatever.
This means that the people who develop code no longer have willful ignorance of operational environments, and the people who operate the environments can’t do so in a vacuum of knowledge about the software itself. This increased communication and reliance IS DevOps. That’s it. Nothing more. It’s a methodology. It’s not a panacea and it’s not for everyone. How can you tell if it’s for you?
Let’s answer some questions…
Does your organization have programmers? Do you provide Software as a Service? Do you release software updates frequently?
For the 90% of companies out there without that particular environment, then you probably aren’t using DevOps, and that’s fine, because there’s almost nothing it can do for you. Especially if you don’t have programmers. Because hey, no dev, right?
You’ll notice that nowhere in the preceding text did I mention the tools that DevOps uses. That’s because the tools are completely separate. Using “puppet” doesn’t mean you subscribe to the DevOps methods (or even the mentality), and although DevOps may not be necessary for your environment, you might find puppet extremely useful. Let me say that again, Using the same tools as DevOps shops use does not tie you to the DevOps methodology.
As alluded to in the last answer up above, the shops that run DevOps need environments that can change quickly and absolutely. They needed tools that could do it, because you can’t manually change hundreds of application servers. Because of their need to change that many machines, and have it happen nearly instantaneously, tools to automate this kind of change were developed and implemented.
Other technologies that get lumped into DevOps, cloud computing and virtualization, are also natural off-shoots of the type of environment where you have hundreds of application servers. Of course that kind of environment is going to be heavily into virtualization (if they’ve got an existing large infrastructure) or cloud computing (if they don’t).
Again, DevOps doesn’t “own” these technologies. They just use them (and advance them by writing tools to improve them, in many cases).
So there, that’s my take. For the people who can use it, DevOps is developing into an exciting methodology to ensure increased availability and stability of IT resources.
It’s not for everyone, but you owe it to yourself to take a look at the tools that too many people have been misbranded “DevOps”. There’s a lot of functionality there, and it can decrease the amount of time you spend slogging through administrative tasks.
Edit
It looks like I’m not the only one who’s been thinking about this, too. Benjamin Smith wrote his take as well, and it seems like we agree quite a bit. |
Yuri Gripas/Reuters Where you at, Speaker Ryan? Some people came by to drop off some papers for you.
WASHINGTON ― Planned Parenthood supporters tried to deliver petitions with thousands of names to House Speaker Paul Ryan (R-Wis.) on Friday, urging him not to defund the reproductive health care provider.
They were greeted by Capitol police and a locked door.
The women’s health care advocates hoped to present Ryan with 87,000 petitions opposing his announcement Thursday that Republicans will defund Planned Parenthood as part of their effort to repeal the Affordable Care Act.
Dressed in pink “I Stand With Planned Parenthood” shirts, they hit one obstacle after another when they arrived at the Longworth House Office Building. Capitol police held them up as they came in, and they had to have a Hill staffer come down and escort them to Ryan’s office, which is not normal. Once they got there, the office was locked and half a dozen officers stood guard in the hallway.
It’s unclear if anyone was inside ― it wasn’t Ryan’s speaker office ― but the excessive security and the sign on the door that read, “Please knock, only scheduled appointments will be admitted,” at least gave the appearance that staffers were around. It was also early Friday afternoon.
Advocates tweeted pictures as they stood in the hallway with their petitions.
.@SpeakerRyan's office sent 6 security guards to block delivery of 87K #IStandWithPP petitions telling Ryan not to defund Planned Parenthood pic.twitter.com/56QHwhjR2q — Planned Parenthood (@PPact) January 6, 2017
.@SpeakerRyan's office is appointments-only & conveniently closed now—right when we came by to drop off thousands of #IStandWithPP petitions pic.twitter.com/wCqOjzZION — Planned Parenthood (@PPact) January 6, 2017
Eventually, the Planned Parenthood supporters headed to the nearby office of Rep. Gwen Moore (D-Wis.), who supports their cause and let them in to hear their concerns. They left their boxes of petitions with her office to be delivered to Ryan later.
“Paul Ryan may have locked his doors, but he can’t drown out our voices,” said Eric Carhart of Planned Parenthood Action Fund. “Millions of women, men and young people, nearly half of whom are people of color, rely on Planned Parenthood for reproductive health care, including nearly 60,000 in Wisconsin. If Paul Ryan is going to take away our health care ― and the care of millions of people ― the least he can do is meet us face to face.”
A spokeswoman for Ryan did not respond to a request for comment.
Capitol police did not answer The Huffington Post’s question about why they stationed officers outside Ryan’s office.
Republicans have routinely voted to defund Planned Parenthood over the years, but under President Barack Obama, their bills never had a chance of becoming law. That could change under President-elect Donald Trump.
Some GOP lawmakers say Planned Parenthood shouldn’t get any federal money because it provides abortions. But that’s a misleading claim: The federal Hyde Amendment already bans federal spending on abortion, except in very rare cases. And abortion services comprise a tiny fraction of Planned Parenthood’s work anyway. The vast majority of its services include testing for and treating sexually transmitted diseases, providing birth control, offering cancer screenings and other health care.
Planned Parenthood gets about one-third of its funding from the government, most of which comes through Medicaid reimbursements. So when Republicans talk about defunding Planned Parenthood, what they really mean is that many low-income women who rely on federal money to receive health care services at these clinics won’t be covered anymore. The organization won’t go away; it just won’t be able to serve as many people, particularly women who are economically disadvantaged. |
Q:
Javascript string formatting, short question
How can I use javascript to add a number (any number between 0-100) followed by a underscore, before the variable value?
Example:
2000 becomes 12_2000 //a number of my choice is added followed by an underscore
hello becomes 12_hello
The number (12 in this case) is a constant chosen by me!
Thanks
A:
i + '_' + x where i is the number and x is an arbitrary value.
|
A former U.S. Forest Service ranger was ordered this week to pay a disabled Afghanistan war veteran and another man almost $600,000 after a federal judge ruled that the ranger violated their civil rights by using excessive force during their 2014 arrests at the Juan Tomas campground in the mountains east of Albuquerque.
State vs. C.O. Our client was charged with trafficking and possession of a controlled substance and other charges. The case was dismissed by the prosecution after our client won a motion to suppress (exclude at trial) all evidence obtained by law enforcement as a result of unlawful and unconstitutional means and in violation of our client’s rights under the United States Constitution.
A Black motorist was stopped without probable cause and forced against his will to submit a blood sample by the Hobbs Police Department. The jury awarded approximately $600,000 for the violation of his Fourth Amendment right to be free from unlawful search and seizure. Attorney’s fees and costs were awarded by the Court.
Personal injury resulting in traumatic brain injury from a motorcycle crash. Case settled for approximately $750,000. The jury awarded a verdict of approximately $385,000 against the State of New Mexico Department Transportation. |
/* Copyright (C) 2015-2020 Andreas Shimokawa, Carsten Pfeiffer
This file is part of Gadgetbridge.
Gadgetbridge is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
Gadgetbridge is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>. */
package nodomain.freeyourgadget.gadgetbridge.model;
import java.io.Serializable;
public interface Alarm extends Serializable {
/**
* The {@link android.os.Bundle} name for transferring parceled alarms.
*/
String EXTRA_ALARM = "alarm";
byte ALARM_ONCE = 0;
byte ALARM_MON = 1;
byte ALARM_TUE = 2;
byte ALARM_WED = 4;
byte ALARM_THU = 8;
byte ALARM_FRI = 16;
byte ALARM_SAT = 32;
byte ALARM_SUN = 64;
int getPosition();
boolean getEnabled();
boolean getUnused();
boolean getSmartWakeup();
boolean getSnooze();
int getRepetition();
boolean isRepetitive();
boolean getRepetition(int dow);
int getHour();
int getMinute();
String getTitle();
String getDescription();
} |
Q:
How can I check the hash of a bitcoin block?
Let's pick an example bitcoin block: #499583
This is the block: https://insight.bitpay.com/api/rawblock/000000000000000000677c4077da7c9f01dde5f332ba2fbff962ee699714d5da
It starts with 00000020164a1e4a7f34b96b0e201d....
I'm trying to hash it so that the hash is 000000000000000000677c4077da7c9f01dde5f332ba2fbff962ee699714d5da again. This is my Javascript-Code:
var Bitcoin = require('bitcoinjs-lib');
var request = require('request');
var crypto = require('crypto');
function getRawBlock(blockHash) {
return new Promise((resolve, reject) => {
request('https://insight.bitpay.com/api/rawblock/' + blockHash, // hitting an insight API to get the full block
(error, response, body) => {
try {
var block = JSON.parse(body); // result is in JSON
resolve(block.rawblock)
} catch (error) {
reject(error)
}
})
})
}
getRawBlock('000000000000000000677c4077da7c9f01dde5f332ba2fbff962ee699714d5da')
.then((rawBlock) => {
var hash = crypto.createHash('sha256').update(rawBlock).digest('hex');
console.log(hash);
})
})
But the result is 484cd10be70dbc7615dd9a71b1f91375b100715d9b2a0ecc6a05b9d247a8cda9.
What am I doing wrong? The result should be 000000000000000000677c4077da7c9f01dde5f332ba2fbff962ee699714d5da. Do I hash something in the wrong format?
A:
Seems to me that you are hashing the whole block instead of header only. Take my code (in C++).
void test ( )
{
const MyByteArray header ( QByteArray::fromHex (
"00000020" // version
"164a1e4a7f34b96b0e201dcc6a623c63fe3874696e4875000000000000000000" // prev hash
"49de8b4f4bfa9fc890d3d28a93156a111f891dc680090cd497b58a7d5c2b09cf" // merkle
"2f62345a" // timestamp
"edb00018" // bits
"ffdfd257" ) ); // nonce
const MyKey32 key ( header.sha256d ( ) );
qDebug ( ) << key.toString ( );
}
and the output is:
000000000000000000677c4077da7c9f01dde5f332ba2fbff962ee699714d5da
|
Q:
How to find the angle of triangle in MATLAB
I'm trying to find the angle of the the triangle in MATLAB.
e.g. in the triangle below, I want to find the angle of ABC (marked as black).
if a = 40, b=50,
How I can I find the angle (in degree) of ABC in MATLAB ?
Thanks
A:
In a right angled triangle, the tangent of of the acute angles can be find by taking the ratio of side opposed to the angle and side it shares with the right angle. These correspond to your values a and b. Then you have to take the inverse tangent of this ratio. This results in atan(a/b).
|
[Ultrasonic diagnosis of liver hydatidosis].
The paper is concerned with a study of an ultrasound picture of verified hydatidosis in 62 patients. The symptoms of hydatid cysts are the presence of daughter cysts and "hydatid sand", cuticular membrane desquamation, local cyst wall thickening and parietal layers, a necrotic zone in a preparasitic space and cyst calcification. The detection of these symptoms helps to estimate not only the type of a hydatid cyst but also the state and character of parasite activity permitting a choice of therapeutic tactics. |
Investigation of agglomeration behavior of rye and wheat straw during FBC combustion
Abstract:
Straw, as by-product of the agricultural production, could be considered an attractive renewable fuel. However its high alkali and chlorine content are responsible for different technological problems during its combustion. One of the main problems in the case of fluidised bed combustion is the agglomeration of bed particles and defluidisation fo the bed. Aim of this work is to investigate the agglomeration behavior of straw pellets during theris combustion in a small scale fluidised bed reactor.Combustion tests (textasciitilde 7h) were performed in a small-scale fluidised bed reactor (30 kWth) with straw pellets. Three fuels were tested: wheat straw pellets, rye straw pellets and wood pellets as reference. The temperature in the bed was about 800textdegreeC. EDX analysis of aggleomerates and ash samples were performed.Agglomerates were found in all straw experiments while no agglomerates were observed for the wood tests. In the case of rye straw defluidisation was achieved. Both agglomeration mechanisms coating-induced and melting-induced werde observed. The coating was characterized by high Si and lowerd melting point than ashes and may be the result of ash-bed particles interaction. «
Straw, as by-product of the agricultural production, could be considered an attractive renewable fuel. However its high alkali and chlorine content are responsible for different technological problems during its combustion. One of the main problems in the case of fluidised bed combustion is the agglomeration of bed particles and defluidisation fo the bed. Aim of this work is to investigate the agglomeration behavior of straw pellets during theris combustion in a small scale fluidised bed reactor... » |
/********************************************************************************
* Copyright (c) 2011-2017 Red Hat Inc. and/or its affiliates and others
*
* This program and the accompanying materials are made available under the
* terms of the Apache License, Version 2.0 which is available at
* http://www.apache.org/licenses/LICENSE-2.0
*
* SPDX-License-Identifier: Apache-2.0
********************************************************************************/
package org.eclipse.ceylon.model.typechecker.model;
public interface Named {
public String getName();
public String getName(Unit unit);
}
|
Background
==========
When death due to exsanguination does not immediately occur in trauma patients, bleeding and shock increase the risk of multiple organ failure and late mortality. Much attention has been given to coagulopathy because it is an independent predictor of mortality. The proposed mechanism of trauma-induced coagulopathy (TIC) is that shock and tissue injury lead to systemic anticoagulation by widespread endothelial damage and activation of protein C (PC) \[[@B1]\]. Thrombin generation, PC activation, and hyperfibrinolysis are all associated with endothelial glycocalyx degradation \[[@B2]\]. Meanwhile, TIC and the combined effects of shock and hypothermia would theoretically result in platelet dysfunction through disruption of activation and adhesion pathways \[[@B3]\]. To date, however, the contribution of platelet activity and endothelial damage/dysfunction to TIC remain to be defined; doing so may offer novel therapeutic targets \[[@B4]\].
Soluble P-selectin (sPsel) and von Willebrand factor (VWF) have been described as plasma markers of platelet activation and endothelial damage/dysfunction, respectively \[[@B5],[@B6]\]. Characterizing the evolution of sPsel and VWF levels in trauma patients may help to understand the roles of platelet activation and endothelial dysfunction in trauma and TIC. Our hypothesis was that in severe trauma patients, the sPsel and VWF levels on admission are associated with TIC and that changes in these levels in the early stage may predict outcomes. Therefore, the aim of our study was to investigate whether correlations exist among levels of sPsel, VWF, and coagulation parameters; the presence of coagulopathy; and 30-day mortality among trauma patients.
Methods
=======
All consecutive trauma patients admitted to the intensive care unit (ICU) between May and September 2012 and who had a \>48-h estimated length of stay in the ICU were included in this study. Exclusion criteria were as follows: \<18 y of age, pregnant, or currently undergoing anticoagulation or antiplatelet therapy.
This study was approved by the Ethics Committee of Tongji Hospital (Wuhan, China), and written informed consent was obtained from all patients or their family members.
On admission to the emergency room, patients were initially evaluated, were resuscitated (with crystalloids), and then underwent emergency surgery when necessary. Only the patients transferred to the ICU within 24 h of the injury were included in the study. Blood samples were collected daily after admission to ICU for 1 week; the first sampling was completed as early as possible following admission. The Injury Severity Score (ISS) was also obtained on admission to the ICU.
In the central clinical laboratory of Tongji Hospital, the blood samples were collected into citrate vacuum tubes and centrifuged at 2000 × *g* for 10 min. Platelet-poor plasma was obtained for immediate analysis or storage at −70°C within 1 month. sPsel concentrations were determined by commercially available ELISA kits (R&D Systems, Inc., USA). VWF antigen, coagulation factor VII (FVII), and PC concentrations were determined and routine coagulation tests (prothrombin time, activated partial thromboplastin time, and fibrinogen) were performed using the STA-R automated coagulation analyzer and commercially available reagents (Diagnostica Stago, France). Data on hemoglobin (Sysmex 2100; Sysmex Corp., Japan) and blood glucose (Modular DPP; Roche Corp., USA) on the first day were collected from the laboratory information system.
TIC was defined as a prothrombin ratio (PTR) of \>1.2 within 1 day after admission according to a recent epidemiological study of \>5000 patients \[[@B7]\].
Statistical analysis
--------------------
The Kolmogorov--Smirnov test was used to verify the normality of distribution of continuous variables. Normally distributed quantitative variable were compared between patients with and without coagulopathy and between survivors and nonsurvivors by Student's t test and described as mean ± standard deviation. Non-normally distributed quantitative variables were compared by the Mann--Whitney U test and described as median values and interquartile ranges; qualitative variables were compared by the chi-square test and described in figures and as percentages. Pearson's or Spearman's correlation coefficients were calculated to determine correlations between sPsel/VWF levels and other variables. A *p* value of \<0.05 was considered to be statistically significant. Data were analyzed using SPSS 13.0 for Windows (SPSS Inc., Chicago, IL).
Results
=======
A total of 82 patients (54 male, 28 female; mean age, 45.3 years) were enrolled in this study. No antithrombin, recombinant activated human PC, or recombinant FVII concentrations were given for the included patients. None of the patients had received blood product transfusions until arrival at the hospital. Thirty-seven (45.1%) patients developed coagulopathy upon admission to the ICU or during the first day. The 30-day mortality rate was 20.7% (n = 17); 13 patients died of multiple organ dysfunction syndrome, 3 died of respiratory dysfunction, and 1 died of acute cerebral hemorrhage. Table [1](#T1){ref-type="table"} delineates the demographics, clinical characteristics, and administration of blood components on the first day stratified into patients with and without coagulopathy.
######
Patients stratified by presence of coagulopathy
**Total** **Coagulopathy** **Non-coagulopathy** ***P*value**
----------------------------------------- --------------------- --------------------- ---------------------- --------------
Age (y) 45.3 ± 8.2 47.2 ± 7.1 41.5 ± 5.9 0.419
Male, n (%) 54 (65.9%) 26 (70.3%) 28 (62.2%) 0.490
Blunt trauma 79 (96.3%) 35 (94.6%) 44 (97.8%) 0.550
Type of trauma
Cerebral 18 8 10
Extremities 2 0 2
Abdominal 6 1 5
Thoracic 10 3 7
Multi trauma 43 24 19
Other 3 1 2
ISS 27.6 ± 2.2 33.8 ± 3.5 23.3 ± 1.8 0.003
30-day mortality, n (%) 17 (20.7%) 13 (35.1%) 4 (8.9%) 0.004
Laboratory analyses on admission
sPsel (NR: 20--44 ng/mL) 54.8 ± 22.6 49.4 ± 26.0 59.5 ± 18.2 0.044
VWF (NR: 66--176%) 224.1 (198.3-245.1) 205.8 (135.5-231.1) 244.2 (199.2-247.2) 0.014
PTR (NR: 0.88-1.12) 1.18 (1.07-1.56) 1.68 (1.41-1.74) 1.08 (1.05-1.13) \<0.001
Protein C (NR: 70--130%) 76.7 ± 38.8 48.0 ± 19.1 101.5 ± 34.2 \<0.001
Factor VII (NR: 55--170%) 74.4 ± 37.0 46.0 ± 24.2 98.9 ± 27.5 \<0.001
Hemoglobin (NR: 110-160 g/L) 101.1 ± 29.9 90.3 ± 29.4 109.8 ± 27.6 0.022
Glucose 8.39 ± 2.78 8.86 ± 3.15 8.09 ± 2.38 0.411
(NR: 4.11-6.05 mmol/L)
Transfusions in units for the first day
PLTC 1.5 (1.0-2.0) 1.5 (1.0-2.0) 0
(n = 5) (n = 5)
FFP 3.5 (2.5-7.0) 4.0 (3.0-7.5) 2 and 4 units 0.230
(n = 9) (n = 7) (n = 2)
PRBC 2.5 (1.5-4.0) 2 and 2 units 2.5 (1--4.5) 0.315
(n = 13) (n = 2) (n = 11)
Frequencies are given as count with percentage and were compared by the chi-square test. Transfusions (units) and admission VWF and PTR levels are given as medians (interquartile range) and were compared by the Mann--Whitney U test. Levels of other parameters, age, and ISS are given as means ± standard deviations and were compared by Student's t test. *ISS* Injury Severity Score, *NR* normal range, *PLTC* platelet concentrates, *FFP* fresh frozen plasma, *PRBC* packed red blood cells.
Correlations between levels of sPsel/VWF and levels of coagulation parameters (PC and FVII) upon admission to the ICU are presented in Table [2](#T2){ref-type="table"}; significant associations were noted (Figures [1](#F1){ref-type="fig"} and [2](#F2){ref-type="fig"}).
{#F1}
######
Correlations between levels of sPsel/VWF and coagulation parameters upon admission
**Admission sPsel** **Admission VWF**
---------------- --------------------- ------------------- ------- -------
Admission PC 0.401 \<0.001 0.245 0.026
Admission FVII 0.456 \<0.001 0.253 0.022
*sPsel* soluble P-selectin, *VWF* von Willebrand factor, *PC* protein C, *FVII* coagulation factor VII.
{#F2}
The evolution of sPsel and VWF levels during the first week after admission to the ICU, stratified by outcome, is presented in Figure [1](#F1){ref-type="fig"}. The sPsel and VWF levels were mostly above the upper limit of normal throughout the first week. The admission sPsel and VWF levels were above the upper limit of normal in 63.4% (n = 52) and 85.4% (n = 70) of patients, respectively. No significant differences were found in sPsel levels on each day between survivors and nonsurvivors (Figure [3](#F3){ref-type="fig"}a). VWF levels were lower during the first 3 days and higher on day 7 in nonsurvivors than in survivors (all *p* \< 0.05) (Figure [3](#F3){ref-type="fig"}b).
{#F3}
Discussion
==========
The main finding of this study was that both the admission sPsel and VWF levels were lower in patients with than without TIC and were significantly correlated with the coagulation parameter levels. Early VWF levels among trauma patients in the ICU were lower in nonsurvivors than in survivors; however, at the end of the first week, VWF levels became higher in nonsurvivors than in survivors.
In the current study, TIC was defined as an admission PTR of \>1.2 according to Frith's epidemiological study \[[@B7]\], in which a PTR of \>1.2 was associated with a stepwise increase in mortality and blood product requirements. In addition, the authors were able to demonstrate that the often-cited coagulopathy threshold of PTR/INR \> 1.5 fails to detect 16% of patients with poor outcomes. Using a threshold of PTR \> 1.2, 45.1% of the included patients were defined as having TIC in our study and were associated with a higher ISS and 30-day mortality rate. Meanwhile, we selected PC and FVII as the markers of coagulation; these parameters have been described as sensitive indices for coagulopathy and were associated with the outcome of trauma patients \[[@B8],[@B9]\].
VWF is synthesized in endothelial cells and megakaryocytes and is released after stimulation by thrombin or other mediators of thrombosis and inflammation \[[@B10]\]. Activated platelets may occasionally contribute to the circulating pool of VWF in patients with thrombotic disorders, but platelet VWF after release from α granules tends to remain bound to the platelet surface. Thus, we may assume that the majority of plasma VWF comes from endothelial cells and that an increase in plasma VWF levels can indicate endothelial activation/damage. P-selectin is an adhesion molecule present in platelets; it is expressed on the platelet surface upon activation as well as on the endothelium in the presence of an atherosclerotic plaque. However, sPsel in the plasma is thought to arise predominantly from platelets with a minimal contribution from endothelial cells, suggesting that sPsel is likely to reflect platelet activation \[[@B11],[@B12]\]. Increased levels of sPsel/VWF have been observed in patients with stroke, coronary artery disease, acute myocardial infarction, and deep vein thrombosis \[[@B13]-[@B19]\]. Endothelial damage and platelet dysfunction also seem to be present in patients with severe trauma and TIC, but the mechanisms by which this damage and dysfunction develop are still largely unknown. Meanwhile, the evolution of sPsel and VWF levels following severe trauma has been poorly described. In our study, the sPsel and VWF levels in trauma patients during the first week after entering the ICU were generally above the normal reference range regardless of outcome, which suggests persistent activation of endothelial cells and platelets in these trauma patients.
In our study, the admission VWF levels in patients with coagulopathy and in nonsurvivors were lower than those in patients without coagulopathy and survivors. The admission VWF levels were also correlated with the admission PC/FVII levels, implicating that early low VWF levels might be mainly attributed to coagulopathy and predict a poor outcome. It is known that after activation by thrombin (mediated by protease-activated receptor), endothelial cells release VWF in approximately 30 min \[[@B20]\]; however, in TIC, thrombin generation is impaired and/or diluted \[[@B1]\]. This causal relationship may explain the lower admission VWF levels in patients with than without coagulopathy. Our VWF results were close to those of a previous study by Ostrowski et al. \[[@B21]\] on biomarker profiles in acute TIC, but conflicted with those of a study by Oliveira et al. \[[@B22]\] in which VWF levels of patients with severe traumatic brain injury were higher in nonsurvivors than in survivors upon admission, at 24 h, and at 7 days. Although the morbidity of coagulopathy in Oliveira's study is unknown, we infer that the inconsistent results of the two studies may be partly attributed to different morbidity of coagulopathy between cerebral and extracerebral injuries.
During the first week after admission, VWF levels in nonsurvivors peaked on day 7 and were higher than those in survivors. Similarly, the VWF levels of patients with traumatic brain injury in two previous studies \[[@B22],[@B23]\] peaked on day 7 and within the second week after entering the ICU. These findings suggest that observing changes in VWF levels may be helpful in predicting the mortality of trauma patients in the ICU.
Platelet dysfunction after trauma has been characterized in some recent studies \[[@B24],[@B25]\]. Our study also found that although the sPsel levels of trauma patients during the first week were generally above the normal reference range, the admission sPsel levels in patients with coagulopathy were lower than the levels in patients without coagulopathy; they were also correlated with the admission PC/FVII levels. However, no significant differences in the sPsel levels between survivors and nonsurvivors were found during the first week. This may be attributed to the dual nature of severe injury, which promotes both platelet activation and coagulopathy that impedes platelet activation. Our data may partly explain why platelet transfusion has not seemed essential for correction of TIC in numerous clinical trials \[[@B26]-[@B29]\]. However, transfusion of normally functioning platelets may be associated with additional benefits such as restoration of the endothelium and modulation of infective and inflammatory sequelae \[[@B4]\].
This study has several limitations. Since initial samples were collected after admission to the ICU, the impacts of emergency treatments prior to admission on coagulation markers had not been evaluated, for example, patients with traumatic brain injury in our study received mannitol to reduce acutely raised intracranial pressure until more definitive treatment can be applied, limited literatures have reported the functions of mannitol on inhibiting platelet activation and increasing vasopermeability of endothelial cells \[[@B30],[@B31]\], its possible effects on sPsel/VWF levels might have interfered our results. Second, as an observational study, it did not allow for independent estimation of the cause-and-effect relationship between sPsel/VWF levels and outcome. Third, because of the limited number of patients and amount of clinical data included, a more detailed classification and analysis of the enrolled patients (e.g., according to the presence of sepsis or organ failure) could not be performed. Fourth, conditions possibly affecting sPsel and VWF levels in the enrolled patients, such as von Willebrand disease or congenital platelet function defects, were not excluded.
In conclusion, our study revealed that sPsel and VWF levels in trauma patients are generally above the normal reference range for at least 1 week. The admission levels of sPsel and VWF are greatly influenced by the presence of coagulopathy such that the relatively lower levels of these parameters in trauma patients often do not predict less platelet/endothelial dysfunction or a better outcome. Moreover, restoration of endothelial function seems to be a very important factor in improving the prognosis of trauma patients. Further prospective studies with larger sample sizes are needed to confirm these conclusions.
Competing interests
===================
The authors declare that they have no competing interests.
Authors' contributions
======================
NT conceived of and designed the study, performed the statistical analysis, and drafted the manuscript. SY collected and analyzed the clinical information of the objectives. ZS participated in the study coordination and helped to draft the manuscript. YP participated in the study designed and carried out the coagulation tests. All authors read and approved the final manuscript.
|
Drawing from over 150 interviews with teens, psychologist Ritch Savin-Williams seeks to separate fact from fiction in this survey of coming-out experiences. He illustrates the range of family reactions and the factors that determine how parents come to terms with the disclosure over time. |
// This file is part of CaesarIA.
//
// CaesarIA is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// CaesarIA is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with CaesarIA. If not, see <http://www.gnu.org/licenses/>.
//
// Copyright 2012-2014 Dalerank, [email protected]
#ifndef __CAESARIA_DATETIME_H_INCLUDE_
#define __CAESARIA_DATETIME_H_INCLUDE_
#include <time.h>
enum class Month {
january=0, february, march, april,
may, june, july, august, september,
october, november, december
};
class DateTime
{
public:
typedef enum { dateLess=-1, dateEquale=0, dateMore=1 } DATE_EQUALE_FEEL;
enum { weekInMonth = 4, daysInWeek = 7, monthsInYear = 12, secondsInHour=3600 };
static const DateTime invalid;
unsigned char hour() const;
Month month() const;
int year() const;
int get(int prop) const;
unsigned char minutes() const;
unsigned char day() const;
unsigned char dayOfWeek() const;
unsigned char seconds() const;
void setHour( unsigned char hour );
void setMonth( Month month );
void setYear( unsigned int year );
void setMinutes( unsigned char minute );
void setDay( unsigned char day );
void setSeconds( unsigned char second );
void setDate(unsigned int year, unsigned int month, unsigned int day);
explicit DateTime( const char* strValue );
explicit DateTime( time_t time );
DateTime( int year, unsigned char month, unsigned char day,
unsigned char hour=0, unsigned char minute=0, unsigned char sec=0 );
DateTime( const DateTime& time );
DateTime();
DateTime date() const;
DateTime time() const;
unsigned int hashdate() const;
unsigned int hashtime() const;
static DateTime fromhash( unsigned int hash );
int daysTo( const DateTime& future ) const;
int equale( const DateTime& b );
int monthsTo(const DateTime& end) const;
DateTime& appendMonth( int month=1 );
DateTime& appendWeek( int weekNumber=1 );
DateTime& appendDay( int dayNumber=1 );
DateTime& operator=( time_t t );
DateTime& operator=( const DateTime& t );
static const char* dayName( unsigned char d );
static const char* monthName(Month d );
static const char* shortMonthName( Month d );
static int daysInMonth(int year, int d );
int daysInMonth() const;
const char* age() const;
bool isValid() const;
bool operator>( const DateTime& other ) const;
bool operator>=( const DateTime& other ) const;
bool operator<( const DateTime& other ) const;
bool operator<=( const DateTime& other ) const;
bool operator==( const DateTime& other ) const;
bool operator!=( const DateTime& other ) const;
static DateTime currenTime();
static unsigned int elapsedTime();
protected:
unsigned int _seconds;
unsigned int _minutes;
unsigned int _hour;
unsigned int _day;
unsigned int _month;
int _year;
long _toJd() const;
void _set( const DateTime& t );
int _getMonthToDate( const long end ) const;
int _isEquale( const long b );
int _getDaysToDate( const long other ) const;
DateTime _JulDayToDate( const long lJD );
};
class RomanDate : public DateTime
{
public:
static const int abUrbeCondita = 753;
const char* age() const;
static const char* dayName( unsigned char d );
static const char* monthName( Month d );
static const char* shortMonthName( unsigned char d );
explicit RomanDate( const DateTime& date );
};
inline Month operator-(const Month& a, int month )
{
month %= DateTime::monthsInYear;
int mIndex = (int)a + ((int)a < month ? DateTime::monthsInYear : 0);
mIndex -= month;
return Month( mIndex );
}
#endif //__CAESARIA_DATETIME_H_INCLUDE_
|
The present invention relates to a rotary die cutter for blanking corrugated fiberboard sheets or the like.
As a rotary die cutter of this type, a cutter, for example, shown in FIGS. 4 to 6 has been publicly known. In this cutter shown in FIG. 4, frames 1 are erected on both sides, right and left, and a die cut cylinder 3 and an anvil cylinder 4 are rotatably supported on these frames 1 via bearings 5.
The die cut cylinder 3 has a cylindrical outer peripheral surface, and at opposite ends thereof are provided support shafts 3a coaxially. Each of the support shafts 3a is rotatably supported on the frame 1 via the bearing 5. Similarly, the anvil cylinder 4 also has a cylindrical outer peripheral surface, and at opposite ends thereof are provided support shafts 4a coaxially. Each of the support shafts 4a is rotatably supported on the frame 1 via the bearing 5.
At a portion where each support shaft 3a protrudes from the frame 1, a gear 6 is provided to cause the die cut cylinder 3 to rotate. Also, at a portion where each support shaft 4a protrudes from the frame 1, a gear 7 is provided to cause the anvil cylinder 4 to rotate. These gears 6 and 7 mesh with each other.
Each frame 1 is provided with a side cover 8 for covering the gears 6 and 7. This side cover 8 is constructed such that a portion under the gears 6 and 7 (a portion under the bearings 5) forms an oil reservoir 8a for storing a lubricating oil. The lubricating oil stored in the oil reservoir 8a adheres to a gear 10 supported rotatably on the frame 1, and further adheres to the gear 7 meshing with the gear 10, so that the gears 7 and 6 are lubricated. The bearing 5 is lubricated by grease loaded inside.
As shown in FIG. 6, a blanking section itself is constructed so that the rotation is transmitted from, for example, a printing unit (not shown) on the upstream side by a connection gear 13 meshing with the gear 6, and is further transmitted to a unit (not shown) on the downstream side by a connection gear 14 meshing with the gear 6.
As shown in FIGS. 4 and 5, a blanking die 11 is installed on the die cut cylinder 3, and this blanking die 11 is provided with knives 11a. The knife 11a performs blanking of a corrugated fiberboard sheet 12 by holding the corrugated fiberboard sheet 12 between the knife 11a and the surface of the anvil cylinder 4.
The rotary die cutters come in two types: a cutting type called soft cut in which a sawtooth knife is used as the knife 11a and a rubber anvil is used as the anvil cylinder 4, and a cutting type called hard cut in which a straight tooth knife is used as the knife 11a and a metal anvil is used as the anvil cylinder 4.
In the case of the latter hard cut, since cutting is performed by pressing the hard knife 11a on the hard anvil cylinder 4, the pressing amount, in other words, a center distance between the die cut cylinder 3 and the anvil cylinder 4 is required to be maintained precisely (usually, an accuracy in the order of 1/100 mm is strictly kept). If such a center distance cannot be kept, an uncut portion remains on the corrugated fiberboard sheet 12, or the blade edge of the knife 11a is collapsed by an excessive pressure.
In the above-described rotary die cutter, the bearings 5 are heated by the rotation of the die cut cylinder 3 and the anvil cylinder 4, and part of this heat is transmitted to the frames 1, so that the temperature of the frames 1 rises. Therefore, the frame 1 is elongated by thermal expansion, resulting in an increase in the distance between the support shafts 3a and 4a of the die cut cylinder 3 and the anvil cylinder 4.
For this reason, a cutting pressure of the knife 11a acting on the anvil cylinder 4 decreases, or sometimes a gap is produced between the knife 11a and the anvil cylinder 4, which leads to a possibility that improper cutting occurs. To overcome this problem, with the elapse of time, it is necessary to adjust the aforesaid distance between the support shafts 3a and 4a, or to adjust the blanking die 11, which causes the hindrance to productivity.
Also, part of the aforesaid heat is transmitted to the die cut cylinder 3 and the anvil cylinder 4 via the support shafts 3a and 4a, respectively, by which the temperature of the cylinders 3 and 4 are also increased. At this time, after the support shafts 3a and 4a first becomes hot, the heat conducts gradually from both the ends toward the central portion of the cylinders 3 and 4. That is to say, in each cylinder 3, 4, a temperature gradient is created from both the ends to the central portion. Thus, as indicated by the dashed line in FIG. 4, each cylinder 3, 4 is thermally deformed into a concave form. In this case, a gap between the knife 11a and the anvil cylinder 4 is narrow at portions at both ends of each cylinder 3, 4, and a gap between the knife 11a and the anvil cylinder 4 is wide at the central portion thereof, so that the cutting conditions becomes nonuniform in the width direction.
Further, since the amount of temperature rises of the frames 1 and the cylinders 3 and 4 are not equal, there is a difference between the change amount of center distance between the cylinders 3 and 4 caused by the thermal expansion of the frames 1 and the change amount (average amount in the width direction) of outside diameter of each cylinder 3, 4 caused by the thermal expansion of each cylinder 3, 4 itself. Therefore, with the elapse of operation time, the pressing pressure (average pressure in the width direction) of the knife 11a on the anvil cylinder 4 changes undesirably, which also makes the cutting conditions nonuniform. |
(***********************************************************************)
(* *)
(* OCaml *)
(* *)
(* Xavier Leroy, projet Cristal, INRIA Rocquencourt *)
(* *)
(* Copyright 1996 Institut National de Recherche en Informatique et *)
(* en Automatique. All rights reserved. This file is distributed *)
(* under the terms of the GNU Library General Public License, with *)
(* the special exception on linking described in file ../LICENSE. *)
(* *)
(***********************************************************************)
(* Character operations *)
external code: char -> int = "%identity"
external unsafe_chr: int -> char = "%identity"
let chr n =
if n < 0 || n > 255 then invalid_arg "Char.chr" else unsafe_chr n
external bytes_create: int -> bytes = "caml_create_string"
external bytes_unsafe_set : bytes -> int -> char -> unit
= "%bytes_unsafe_set"
external unsafe_to_string : bytes -> string = "%bytes_to_string"
let escaped = function
| '\'' -> "\\'"
| '\\' -> "\\\\"
| '\n' -> "\\n"
| '\t' -> "\\t"
| '\r' -> "\\r"
| '\b' -> "\\b"
| (' ' .. '~' as c) ->
let s = bytes_create 1 in
bytes_unsafe_set s 0 c;
unsafe_to_string s
| c ->
let n = code c in
let s = bytes_create 4 in
bytes_unsafe_set s 0 '\\';
bytes_unsafe_set s 1 (unsafe_chr (48 + n / 100));
bytes_unsafe_set s 2 (unsafe_chr (48 + (n / 10) mod 10));
bytes_unsafe_set s 3 (unsafe_chr (48 + n mod 10));
unsafe_to_string s
let lowercase c =
if (c >= 'A' && c <= 'Z')
|| (c >= '\192' && c <= '\214')
|| (c >= '\216' && c <= '\222')
then unsafe_chr(code c + 32)
else c
let uppercase c =
if (c >= 'a' && c <= 'z')
|| (c >= '\224' && c <= '\246')
|| (c >= '\248' && c <= '\254')
then unsafe_chr(code c - 32)
else c
type t = char
let compare c1 c2 = code c1 - code c2
|
1. Field of the Invention
The present invention relates to a wiring substrate which electrically or mechanically connects a semiconductor integrated circuit or a circuit substrate, and a semiconductor device using the wiring substrate.
2. Description of the Related Art
Prepreg in which a sheet-like fibrous body as a reinforcing material is impregnated with a thermosetting resin and the thermosetting resin is made in a semi-cured state has been used as a member of a circuit substrate and the like. For example, prepreg is known in which a conductor passes through an insulating layer and which is formed by opening a through hole in a predetermined position and filling the through hole with a conductive paste to become the conductor by hot pressing (see Patent Document 1). In this case, the through hole is opened in the prepreg by a laser, a drill, a punching machine, or the like.
Further, prepreg used as a sealing material of a semiconductor device is disclosed (see Patent Document 2). |
Q:
CMake doesn't know where is Qt4 qmake
I am using Debian OS and I'm trying to point to cmake where is my Qt4.
I try to build qjson library and with its CMakeLists.txt:
http://pastebin.com/fKNp0Qgy
I get:
Qt5 not found, searching for Qt4
qmake: could not exec '/usr/lib/x86_64-linux-gnu/qt4/bin/qmake': No such file or directory
CMake Error at /usr/share/cmake-2.8/Modules/FindQt4.cmake:1386 (message):
Found unsuitable Qt version "" from NOTFOUND, this code requires Qt 4.x
Call Stack (most recent call first):
CMakeLists.txt:55 (FIND_PACKAGE)
-- Configuring incomplete, errors occurred!
I'm not familiar with CMake and Qt config, but I'm curious what setting force CMake FIND_PACKAGE to look into '/usr/lib/x86_64-linux-gnu/qt4/bin/qmake' for qmake.
I have installed Qt 4.8.5 from source and I have Qt4 bin folder in completely different directory.
A:
just try "sudo apt-get install qt-sdk" it works for me
A:
I solved my problem.
Looking for QT_SELECT with grep command I found that QT_SELECT is related to /usr/lib/x86_64-linux-gnu/qt-default/qtchooser/default.conf file. From the "default" file name I assumed that it is what is seen as QT_SELECT. Other configs presented with qtchooser -l are in /usr/share/qtchooser/ and /usr/lib/x86_64-linux-gnu/qtchooser directories.
Such a config file has two lines with paths. I just changed these lines, first pointing to my Qt bin directory and second pointing to my Qt lib directory. Then I could see that qtchooser -print-env shows QTTOOLDIR and QTLIBDIR to my Qt.
Then I could easily build qjson library with CMake, Qt4 was found correctly.
A:
In my experience, this problem is most easily solved by putting the folder containing qmake in your PATH environment variable.
|
Q:
What/who are Yeomen?
I watched all the seasons of Enterprise and now started on The Original Series.
In one of the 1st episodes, Cpt. Kirk gives orders to a Yeoman, something I haven't encountered previously in the Enterprise series.
What and who are these? Are they human? Are they some sort of personal 'slave(s)'?
A:
Actually while KHW's answer and the comments by other users are close they aren't quite hitting the mark on what a Yeoman is. In the context used, as well as in the real world a Yeoman is a RATE not a rank. A rate in the United States maritime entities (US Navy and US Coast Guard) is your job, not your rank (or position) The Yeoman rating (abreviated as YN in both sea going services) is an administrative expert who's two main jobs are pay and personnel issues. In the context of Star Trek they serve in a similar fashion to a personal secretary to the Commanding Officer, or an Aide-de-camp. A Yeoman is an enlisted person who has been to a Yeoman "A" school. Upon completion of school they hold the rank of Petty Officer 3rd Class (YN3 or E-4) and can advance all the way to the rank of Master Chief (YNCM or E-9)
Just to give a bit of reference I was married to an Yeoman for 12 years, and am myself in the US Coast Guard so I know a thing or two about the subject.
A:
A Yeoman is not a type of being; it's a rank rate (thanks Monty129.) Star Trek simply inherited the title, much like the other military titles it uses. (Captain, Ensign, Admiral, First Officer, etc.)
Stealing from Memory Alpha :
Yeoman was a Starfleet title with administrative and clerical duties. Starfleet used different rates of yeoman including "yeoman third class" as seen with Tina Lawton. (TOS: "Charlie X") Some yeoman, such as Janice Rand, were enlisted personnel during their time in this position. However, a yeoman could hold the rank of an officer, as seen with Martha Landon (TOS: "The Apple") and an unnamed yeoman assigned to the USS Enterprise-A, who wore an officer's uniform with the rank of lieutenant junior grade. (Star Trek V: The Final Frontier)
|
[Use of a new double lumen catheter within the scope of intensive care medicine].
A new double-channelled catheter with one main canal lumen and an accessory small lumen and its different ranges of applications are discussed. Reactions of incompatibility and possible changes in efficacy between drugs and infusions can be provided with this new form of a central-vein-catheter. |
Spolsky: Does Slow Growth Equal Slow Death? - johns
http://www.inc.com/magazine/20091101/does-slow-growth-equal-slow-death.html?partner=fogcreek
======
wallflower
Atlassian Confluence (the corporate wiki product from Fog Creek's probable
competitor) has pitiful search functionality, among other things, for all the
revenue that product probably generates from site licensing.
That being said, Atlassian Confluence's "Wiki" is updated nearly every minute
(according to the homepage dashboard) at my company. It's not just a Wiki;
it's a Wiki that normal business users can use. Fog Creek seems to think they
can take on their competitor by mainly focusing on features while IMHO
Atlassian's strength is producing an adequate product that works and more
importantly makes the person at a company who leads and drives its adoption a
likely corporate hero. Corporate sales is tough but lucrative.
> "What set Oracle apart from Ingres," Moore writes, "was that [CEO] Larry
> Ellison drove for 100 percent growth while Ingres 'accepted' 50 percent
> growth."
To achieve 100% growth: Oracle salespeople were fired if they did not achieve
a doubling of their sales quota on a yearly basis.
~~~
chrisbroadfoot
More specifically, the competing product he's referring to is probably
Atlassian's JIRA (bug tracking software).
I for one thought that Joel sounded a bit sour and jealous. Is it that Fog
Creek is losing its "market leadership position"? (was Fog Creek ever a market
leader?)
~~~
pchristensen
I wouldn't say jealous, more like disoriented to realize that his business
hypothesis might be invalid. He designed his company to be a high quality
competitor among many, but now he's got to face a category killer which
requires very different tactics. A core part of his business has to change to
something he doesn't necessarily want.
------
ctrager
Disclaimer: I'm the author of an open source bug tracker, BugTracker.NET, a
sorta hobby project that got better over time and sorta, kinda, "competes"
with FogBugz. Also, I receive money from Atlassian to display their ads on my
website, but other than that, I know nothing about their business. So, I'm not
any sort of insider. But I do pay attention to the space, and here's my two
cents.
Some of the income for these companies comes from the hosted versions of their
apps. I think free and somewhat viral services like GitHub put a lot of
pressure on Atlassian and FogCreek. 1) Downward pressure on what they can
charge. Consider Atlassian's recent price drop. and 2) Classic Joel "Fire and
Motion" pressure to match the competition's features. Kiln is FogCreek
returning defensive fire.
Not to mention less viral players but really nice playes in the hosted space
like Unfuddle, Assembla. Christ, even Google.
So, along with hosted apps, some of the income comes from installed software.
There, both companies compete against open source, like Trac, Redmine, and
even my own BugTracker.NET. Traditionally some stodgier companies have tended
to be fearful about running open source alternatives, but there might be a
generational change going on. There could be a tipping point where open source
developer tools start being perceived even by the stodgier companies as being
the more comfortable, safe, mainstream choice. Safer than commercial. That
might already be happening with version control.
~~~
ghshephard
Note: Atlassian just increased their prices. Our legal department was going to
use their professional 3.x license to manage issues for 300 employees (You'd
be amazed at how far people push Jira - a nominal software defect tracker is
used by my company as a ticketing system, time tracker, project management
system - we've got north of 20,000 issues entered and tracked through it) -
The previous price was $2400 on a quote expiring on Oct 24th. The New quote
(for 4.0 "Enterprise" - no more professional) is $8,000. Both Cheap, but the
new prices certainly aren't a decrease.
I doubt that many enterprise size companies (100+ employee companies) host
their issues at either FogBuz or Atlassian. Security. I'm betting the vast
(90%+?) of their revenue comes from license sales.
BTW - Don't forget Bugzilla as a bug tracker - we were quite happy with it
until we switched to Jira (ironic if you know where the name comes from).
And you are right - Generational Change is happening. Right now. All of the
people who where in their 20s and 30s In the late 90s, are now Managers, and
Directors - and have some clue about open source, so it's coming into
companies from the top, and bottom now.
~~~
ctrager
You are contradicting my unsupported opinions using actual facts? That's not
fair.
Regarding "You'd be amazed": No,I wouldn't. Whatever the humble origins of a
bug tracker, user pressure does push them to accrete more features and
complexity, so even my own little BugTracker.NET also has evolevd to be also a
ticketing system, time tracker, and a tiny bit as a project management system.
(Please let's not talk about permissions and customizable, enforcable,
workflow...)
Here's my favorite way I've seen BugTracker.NET stretched:
<http://frap.cdf.ca.gov/projects/hazard/btnet/bugs.aspx>, by the "California
Department of Forestry and Fire Protection".
You're probably right about the 90% for now, but I think the Generational
Change thing also affects attitudes towards hosted versus installed.
And, you have more and more big companies whose OWN business depends on THEIR
customers trusting THEM to host their customers data, so I think that is a
force for attitudes about hosted solutions changing too.
I work for a company that makes software for futures traders. Our customers
include the trading depts of the biggest banks you can name. Presumably
security conscious and with the expertise to manage the software/hardware
themselves if they chose to. We offer both installable and hosted solutions.
Plenty of these big banks have opted for the hosted solution.
~~~
sireat
Zawinski's Law of Software Envelopment:
Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can.
[http://en.wikipedia.or/wiki/Zawinski%27s_law_of_software_env...](http://en.wikipedia.or/wiki/Zawinski%27s_law_of_software_envelopment#Quotes)
------
edw519
If increasing your growth rate is your objective, this looks like a very nice
first step, Joel. You disguise a PR piece as an objective "how to" in a
national business publication, coming across as an authority, the underdog,
and an all around nice guy who really cares about his customers.
You're an engineer who claims to be "weak" in the sales department, but all
evidence to the contrary: nice "sales hack". Any reasonable person who takes
your advice would be a fool if he bought from your competitor. Not bad for a
couple hours work. Kudos.
~~~
spolsky
Jeez, everything is a conspiracy on Hacker News. How about I wrote it because
I'm a columnist at Inc and I have to turn in one article a month? And how
about, they hired me because they like columnists who are actively running
businesses to write about the issues they face? (c.f. Norm Brodsky, the other
columnist, who has some kind of a box storage business).
None of the plumbers and dog shampoo-vendors who read Inc. do software project
management. The number of leads I get from Inc readers is laughable.
Also, you're confusing sales and marketing. They're different things. We're
pretty good at marketing for a company our size. We're absolutely bad at
sales.
~~~
edw519
Yikes, lighten up, Joel. I really meant what I said. I have no idea how many
leads you get from inc, but I bet you get a few more with that piece.
What I didn't say in my original post was that this was an excellent example
of generating interest in your business while contributing to the community at
large, and that quite a few of us here can learn from it. But now, I'm afraid
to give you another compliment because you may misinterpret it. (Oops, too
late.)
There have been many times when my post was misunderstood because I accidently
omitted the <sarcasm> tags. But this is the first time the inverse ever
happened. Live and learn.
</nosarcasm>
~~~
jister
Actually, I also find your first post sarcastic.
~~~
gruseom
I don't think you're technically allowed to find it sarcastic after the
speaker explains that he meant what he said. Unless, of course, he's lying.
But he isn't. Anyone who reads edw519 regularly (i.e. anyone who reads HN
regularly) knows that's just how he is :)
p.s. edw, given your closing nosarcasm tag without an opening one, must we now
assume that everything you've ever said was non-sarcastic?
~~~
jshen
I think it's perfectly reasonable to believe that the words a person used did
not clearly reflect the thoughts in their head. In fact, I'd say it's fairly
common. Given that, one could be "technically allowed" to find it x even
though the writer insists it's y. It surely didn't sound like a compliment to
me when I read it.
~~~
gruseom
_it's perfectly reasonable to believe that the words a person used did not
clearly reflect the thoughts in their head_
Sure, but that's by definition not sarcasm.
------
elviejo
I'm I the only one that thinks this article is the stick part of the Hockey
stick?
In other posts (<http://www.joelonsoftware.com/articles/fog0000000017.html>)
Joel has said that: "Good Software Takes Ten Years. Get Used To it." And then
makes reference to the hockey stick graph of sales figures for a couple of
products
So ten years have passed for FogCreek and seems that now they are focusing on
the stick.
I would say this is the next logical step in that strategy.
~~~
pchristensen
Joel knew you need developers to make the flat part, but it sounds like he's
realizing you need salespeople to claim the steep part.
------
ghshephard
Joel is definitely talking about Atlassian in this article. In particular, one
of their products, jira, goes head-head with FogBugz. Joel has actually
referred to them in previous articles, in terms of customers threatening to go
to the "Australians" if he didn't implement such-such a feature.
(<http://www.joelonsoftware.com/items/2009/07/20.html>)
Atlassian is really the Major Grower in this space - good sized developer
community, and "App Store" equivalent (Plugin Exchange ) - They have about
50,000 plugins a month downloaded from a library of 400 - 130 of which are for
Jira.
The latest rev of their product, Jira 4.0, has one major feature - a SQL like
query engine, they call it "JQL" - Jira Query Language - which allows you to
do everything you might expect/imagine. Their searching was _already_ better
than FogBugz, but JQL makes you not even not want to compare the two.
Interesting Notes:
Google for "Bug Tracking Software" doesn't bring up FogCreek, but does bring
up Atlassian.
Atlassian is like the "Anti-Fog Creek" in terms of it's thoughts around
office. I've been to their San Francisco Offices (which are supposedly like
their Sydney) - One Big Wide Open Space. No Cubicles. No Offices. Nothing -
just pure Agile openness.
Go to Atlassian.com - you are 4 Clicks away from having the software on your
computer, and it takes about as many seconds. And it figures out whether you
want OS X stuff, linux files, etc...
Go to FogCreek.com - 30 seconds later I _still_ couldn't figure out where to
click to try their stuff - and when I do, I finally land on a page where I
need to start providing Email Addresses, Phone Numbers, accepting terms of
services. It's almost like they are _daring_ you to try the competition.
What's cool, is that _both_ Fog Creek and Atlassian are the ultimate results
of Startups going head-head. Someone will have to write a book about these two
companies.
<http://www.atlassian.com/about/history.jsp> Atlassian: "In 2002, fresh out of
university, Scott Farquhar and Mike Cannon-Brookes, With total start up costs
of $10,000 charged to a Visa card, they built JIRA, a professional bug and
issue tracker, and Atlassian was born. By 2004 the company had grown to six
developers."
<http://fogcreek.com/About.html> Michael Pryor founded Fog Creek Software with
Joel in September 2000.
Fog Creek's Major Problem, and the reason why I suspect Atlassian is going to
wipe them out if they don't get their Act Together, is that Fog Creek has, to
my knowledge, three products:
o Bug/Project Management/Software Project Tracker (fogbuz)
o VNC Hosting Service for Tech Support (Copilot)
o Forums for Software Developers/SysAdmins StackOverflow/ServerFault
o 25 Employees
Atlassian, on the other hand, has:
o Issue Tracking Software (jira)
o Wiki (confluence)
o Source Code Reviewer (fisheye)
o Code Review (crucible)
o Continuous Integration (bamboo)
o Code Coverage (clover)
o Identity Management (Crowd)
o 200 Employees
o 15,000 Customers
http://www.atlassian.com/about/customers.jsp
I don't want to come off sounding like an Atlassian fan-boy, particularly as I
love reading Joel's articles, and I don't think I've ever read anything, ever,
out of Atlassian that caught my attention - but he has his work cut out for
him. Of course, maybe Joel needs someone like Atlassian to shake him up and
get him going...
~~~
ghshephard
Interesting to look at their pricing for jira vs fogbugz - Clearly each of
their pricing (for anything but the smallest companies) is almost the same -
basically they discount the software and profit off the maintenance
contracts):
Fog Creek: $10,000 + $5000/year Atlassian: $8,000 + $4000/year
<http://fogcreek.com/FogBugz/PriceList.html>
<http://www.atlassian.com/software/jira/licensing.jsp>
But, Atlassian is smart, and gets you when you are small:
50 Person Software Shop:
Atlassian: $2200 + $1100/year
FogCreek: $8000 + $1825/year
And, what if you are a small startup - Where FogCreek/Atlassian were 2 Years
after they were founded,
10 Person Software Shop:
Atlassian: $10
FogCreek: $1899 + $365/year.
Given that the products are _roughly_ equivalent, and the customer has decided
for some reason not to just use Bugzilla or Trac , which product do you think
your typical 10 Person Small Software Shop will install.
Or, if you are using Bugzilla, but you are a cranky release engineer, and you
want to replace it with something with a little more horsepower (not to
mention benefiting from the QA/Regression of all those customers of
Atlassian/FogCreek) - which product do you think you might be able to get away
with expensing.
Now, finally - You have grown from 7 engineers to 20 Engineers - there is a
CLOSE TO ZERO chance that you will EVER switch from FogBugz to Jira (Or Vice
Versa) - But, Jira is starting out with a lot more customers, so they
experience a profit wave.
Basically by the time the companies grow to 100 Users (where
FogCreek/Atlassian are making profits off of the Maintenance, as it's been 3+
years since anyone has called for support) - Atlassian has a much bigger slice
of the pie. This does NOT bode well for fogcreek in the coming years, as all
of that Atlassian market share finally starts to pay dividends, further
accelerating their growth, allowing them to invest more in their product, and
further gaining market share...
And that, is one major reason why Atlassian is growing faster, and eating
Joel's lunch.
Ironic, given the essays that Joel has written on pricing. I realize that he
probably doesn't want to price his product at $10 and make it sound "cheap" -
Atlassian was brilliant, and they did the following:
"Get started for $10 All proceeds go to charity" - "www.roomtoread.org" - it's
like they READ Joel's article and said to themselves "Well, we can't cheapen
our product to gain market share, but we _can_ raise money for charity"
~~~
Carlfish
While your analysis of why we're doing the $10 deal is spot on, we only
introduced it a couple of months ago so any benefit we might see is still in
the future. Previously the cheapest edition of JIRA was (if I recall
correctly) $1200.
~~~
ghshephard
Actually, Atlassian has a Reputation, well deserved, of being very socially
conscious. When I went to the Atlassian San Francisco Social a couple weeks
ago, Scott Farquhar seemed most excited and interested in talking about the
Room To Read program. The "Stimulus Program" (The $5 Personal License from
back in April) raised north of $100K and provided a year of education / costs
for 68 Cambodian girls, helped build some libraries, and published a story
book.
It's nice to see that doing good things in the world can also be profitable.
(Al Gore just got my company on the front page of the NYT today doing the same
thing - so I dig it. :-) )
------
geebee
I'm a little sad to read this article. Are you always in a position where slow
growth eventually means slow death? Or is it possible to find a niche where
you can emphasize craftsmanship, quality, and a decent pace?
The reason I ask is that a lot of software developers actually like the idea
of working for a small, highly profitable firm that stays, well, small and
highly profitable.
If it is possible, what are some of the strategies you can employ to identify
and/or hold on to this niche?
BTW, when I say "small", I don't mean small in the sense of total profits or
number of users. I mean "small" as in craigslist small - a company that can
keep the headcount low, avoid employing lots of non-technical workers (like
sales people), and hang onto what makes a "small" company such a great place
to work.
~~~
hello_moto
Not many owners have the mind of Craig. Most owners of small businesses I
worked for didn't settle for a nice beach house, they want a yacht too! and
they want it fast! like ... tomorrow.
I blame humans for being greedy.
~~~
geebee
Eh, I wouldn't really "blame" someone for wanting those things (some would say
greed is good, others (like me) would say that the honest pursuit of wealth
isn't "greedy", but a lot of that just comes down to how we define the word).
My question is for those people who actually _prefer_ to stay small - how you
can find a strategy and niche to make this possible.
I suspect that a big part of it is how and where you sell. Vendors of for-pay
developer tools need to convince a corporate procurement department to hand
over the cash, whereas craigslist merely needs to convince people to post want
ads, either for free or for very small payments. As a result, I suspect that
the "sales people" approach wouldn't do much for them.
Joel went with the micropayment thing for a while, but maybe his space isn't a
really great one for a small niche-company? Hard to say, since developers are
a pretty unique group of people who might work well as a niche market?
------
lawrence
This is the best argument for considering venture capital that I've read in a
while, and it barely mentions venture capital.
~~~
tptacek
Not so fast. First, Spolsky probably doesn't need VC based on their revenue;
they can staff up a sales team without going out for more money. Second,
Spolsky got to spend ~10 years turning the dials to figure out what works for
his product. He's in a good position. He has the option of increasing growth,
and that option is more attractive _right now_ than maintaining current
growth.
No VC funded company has a 10 year runway to figure out how to get their
product right. Very few VC funded companies get 10 years, period: the
investment needs to liquidate at some point.
Finally, Fog Creek all but stumbled into their current product. They had a
"VC-ready" product when they started (CityDesk). If they had gotten funded,
they'd be dead now.
~~~
SwellJoe
_If they had gotten funded, they'd be dead now._
On what do you base this theory?
I don't know that you're wrong...I just don't see how it naturally follows
from anything we know about Fog Creek.
~~~
tptacek
Allow for the fact that I am probably totally wrong about this.
But, when I started reading JoS, Fog Creek was all about CityDesk. If they had
gone for funding, they'd have done it to fund CityDesk.
CityDesk didn't work out for them.
That didn't matter, because there was no VC board to shutter the company or
fire the management. And they hadn't run the VC-company playbook of hiring a
20-region direct sales force or running $1.5MM of ads to promote the product.
So they weren't screwed.
That's all I'm saying.
~~~
SwellJoe
Possibly valid. Venture-backed companies do sometimes evolve successfully, but
I can see how your theory could have played out that way, though.
------
RyanMcGreal
> If you're growing at 50 percent a year, and your competitor is growing at
> 100 percent a year, it takes only eight years before your competitor is 10
> times bigger than you.
Assuming you both start out the same size.
------
petenixey
Awesome discussion. It's been what 10 years since people really started
blogging and we started seeing the progress of companies live and as it
happens?
We've seen what happened to Google/YouTube etc. and how they moved into
hypergrowth and uber-size but this is now the beginning of the next phase for
the non-VC (bona-fide?) companies.
Really interesting article Joel, thanks for sharing.
------
BerislavLopac
So the main point of this article is that the biggest risk a company can take
is to not take any risks, right?
------
rfreytag
Perhaps Joel has discovered why VCs are so dismissive of 'lifestyle'
companies.
If 37Signals starts to see market erosion then we'll know the VCs are correct
and its grow fast or wither till irrelevance.
Personally, I hope the VCs are wrong and that in fact what Joel has to do is
undercut his competition in a way they cannot answer without destroying their
business model. This is what Clayton Christenson talks about in "The
Innovator's Dilemma."
------
albertsun
Joel's blog is an excellent marketing tool and I've read and enjoyed a lot of
posts there and have a greet impression of Fog Creek Software. I know all
about the working environment, what their philosophy in hiring is, how they
treat their programmers, etc. And I've learned a ton about software
development processes and working with others.
One thing that I haven't figured out in all this time reading is, what
products does Fog Creek actually make? I still really don't know what the
products are, or what they do.
In his last post he wrote,
_FogBugz, which is all about giving developers tools that gently guide them
from good to great._
It's a nice description, but it still doesn't really tell me what FogBugz
does. Maybe Joel could blog about how he identified the problem for the
product to solve, what specific features he's really proud of that make
software development easier, etc.
~~~
tedunangst
Go to www.fogcreek.com, it describes all the products.
"FogBugz manages projects, tracks bugs, and even tells you when you’re going
to ship..." It continues from there.
------
MartinCron
Even if you don't agree with what he has to say, his writing, especially for
Inc. Is really good.
I'm having a hard time seeing the comparison of FogBugz vs. Mystery competitor
(consensus says Atlassian?) and Oracle vs. Ingress. Picking a db vendor has a
lot more lock-in and switching costs than using a different bug database.
Also, there are so many more competitors in this space, with plenty of good
free options. Lastly, the barrier to entry is so much lower, I mean, I could
write a usable software project management tool in a weekend, it's trivial. It
would take at least a week to make a fully functional relational database
system.
------
zaidf
I am all for not being secret. But there are exceptions and in this case, if I
am really mapping out a specific strategy to go after a competitor, I wouldn't
blog/write about it. I'd be curious to hear where he draws the line in sharing
strategic plans.
The startup I am doing right now involves public data. I've been able to learn
an incredible deal from my competitor just by googling around and finding the
name of my competitor in the minutes of public meetings.
On a separate note, this makes me feel really good about my decision to take
Sales Management this semester:)
------
stcredzero
I think the reasoning in this article also applies to programming languages.
By that reasoning, it's by far better to have a crappy programming language
that panders to mainstream expectations than to have something innovative that
gives you a more powerful paradigm.
I also think that sometimes the more powerful paradigm still trumps sheer
numbers.
------
wakeless
Does anyone know who the competitor he is talking about is?
~~~
jordanb
Probably these guys: <http://www.atlassian.com/>
~~~
solutionyogi
I doubt if it's atlassian guys. My guess is that it's OnTime by Axosoft. May
be Joel can clarify.
<http://www.axosoft.com/ontime>
~~~
ghshephard
Atlassian goes head-head with FogCreek in terms of features and pricing. <$10K
for 100+ Users. AxoSoft _starts_ at $43K for 100 Users.
|
Q:
Porting security from Java/.NET to PHP
This probably a rather naive question given my limited knowledge in the code I've been looking at, but I want to get my head around it before I start diving into writing actual code myself.
I'm writing a common set of tools for PHP and most of my inspiration has come from the .NET framework. The ironic thing is that I have never used the .NET framework, but I do understand C# and can therefore port the concepts I "do" understand from Mono.
But I have run into a bit of a wall, System.Security. As I browse over the API docs, and the Mono security implementations on Github, I quickly feel like none of features could ever be applied to PHP. My current confusion is as follows:
PermissionSet ps1 = new PermissionSet(PermissionState.None);
ps1.AddPermission(new FileDialogPermission(FileDialogPermissionAccess.Open));
Console.WriteLine(ps1.ToXml().ToString());
So here is a basic example. What I want to do in PHP is create an application partially governed by permissions on the "environment" level. That is to say, one machine shouldn't be able to perform certain actions that another might. For instance, machine A, shouldn't be allowed to TCP to machine B.
But when I look at the code in the example, I don't really understand why it makes any difference. My current understanding is that this is not "setting" the permissions, but "checking" them. And the permission itself is predefined somewhere else, I.E. in the machine.
I have looked over Java's implementation of the same feature, and side by side .NET looks a lot more in-depth. I would like to incorporate this concept into my own PHP code, but right now I don't know how I would do it.
Are the permissions entirely arbitary? does .NET "impose" restrictions? or simply provide security diagnostics to the application? If the last one is true, then porting to PHP is not only possible, but may actually be quite useful. However I know that in PHP, the second one is impossible.
Could someone please clear up what the Java and .NET security namespaces do, and give me an idea of how feasible it is to port to other languages.
A:
Every language has a runtime which connects your code with the outside world. In the case of Java and .NET, this runtime includes a security model. E.g. if a Java application wants to open a file, that request has to pass through the runtime. The runtime can then deny that request. Note that this is not implemented on a library level within the language, but on a language implementation level. From within the runtime, you can only check what you are allowed to do, but not grant yourself new permissions.
Therefore, you can't just implement a security model in another language: you security layer would need some way to perform the security-sensitive action, but that same way would be available to any other code in that language, so your security layer could be bypassed. Instead, this security model needs to be in the runtime itself (in the case of PHP, this would be the interpreter in the default implementation).
I have seen one exception: Perl's Safe module can control which opcodes are available to a piece of code being compiled, which can serve as a coarse sandbox. Here, the runtime doesn't itself provide the security model, but the dynamic nature of the runtime is exploited to implement a security model on top of it.
PHP does have a couple of sandboxing mechanisms: E.g. Runkit can restrict the functions that can be called by a sandboxed piece of code. A common sandboxing technique is also to override built-in functions by versions that check permissions, but that only works as long as there is no way to get the original version back. This can be a viable approach when rewriting compiled code to be sandboxed, but rewriting-based security approaches are prone to miss obfuscated calls.
|
Month: September 2014
You could assume they named it Lucy after their little girl, yet that’s not the case. This lime eco-friendly colored house comes from New Zealand husband and wife Tom as well as Shaye, who ended up being thinking about do-it-yourself house building after reviewing a book on the subject. Once they thought of it, the idea of building their own home was a natural choice for them. Tom had constantly delighted in hands-on job; Shaye had an ability for layout as well as her parents had actually had a building firm. Go House Go Ebook Free
However, neither of them had any sensible structure experience, so they thought it best to start with a few smaller tasks prior to attempting to make a house. The very first of these was a cob pizza oven; that caused a larger cob structure, one more pizza oven, and also at some point to the 185-square-foot little house on wheels they completed in December 2013, which they called Lucy.
As you can see above, there’s a little nook taken for Shaye’s in the house office, bit more than a slim desk and also a big screen Apple screen, however it works. Actually, they make a lot of things operate in the small area. The cash Tom and Shaye invested produced a comfy, mortgage-free residence with a sitting for six in the living area, a resting loft obtainable by means of a little staircase, a shower room with a shower as well as composting toilet, a kitchen area with a big sink as well as gas array, as well as great deals of storage space anywhere. It started out as a wonderful place to live for the two of them, and also with the arrival of their most recent enhancement, a lovely girl called Hazel, they with dignity adjusted it to offer the needs of a family of three.
The sectional sofa has drawers beneath supplying additional storage room, as well as the ottoman also unravels to disclose an important little bit a lot more hiding room, both important attributes to have if you wish to maintain clutter-free in a small area like this. Go House Go Ebook Free
One of the most meaningful lesson Tom and also Shaye have actually drawn from these and also various other DIY tasks is the significance of community to owner-built homes. They keep in mind that most such houses they’ve encountered counted heavily on the aid of community members to obtain them finished. Lucy was no various; the pair had help from family and friends and even numerous strangers who emailed to offer their time and also know-how. The couple pays it ahead by recording their develop and also using strategies and also guidance for various other future home builders on their internet site.
They saw exactly what was happening; their DIY residence not just depend on the neighborhood to develop it, became a neighborhood itself as it acquired followers. Tom and Shaye saw enormous value in that facet of DIY construction and also have actually given that been trying to promote it on their web site, DIY House Building. There they explain most of their jobs, including Lucy, and also preserve a blog page with a lot of sensible ideas on cob and also tiny house building and construction.
Pictures thanks to DIY housebuilding
There’s additionally a cost breakdownfor Lucy that will make interesting analysis for any individual contemplating a comparable task. Total cost had to do with $21,000, and also while costs for many items could be somewhat much less in nations aside from New Zealand, their breakdown will certainly provide you a reasonable concept of the significant expenditures and also clue you in on a host of minor prices you might not have actually considered. Go House Go Ebook Free
Interested in plans for this home?
With all the job they put into building this home and also the commitment they have to sharing their experience, it just made good sense for them to release a set of building strategies. |
Calendar
Sermon Archive
"You cannot claim to worship Jesus in the Tabernacle if you do not pity Jesus in the slum."
-- Frank Weston, Bishop of Zanzibar (d. 1924)
I grew up in a Church that refused to allow children to receive Holy Communion until they were confirmed and, in my home diocese, you had to be at least a teenager to be confirmed which meant that it was a very long time before I was allowed to receive Holy Communion. How things have changed and changed for the better; gone are the days when we heard adults saying that children should not receive Communion because ‘they will not understand’ and, instead, many of us have deepened our appreciation and understanding of this most wonderful sacrament precisely because children have approached the altar with faith. For me, the journey to the admission of children to communion in my old Province was a journey of discovering that belonging mattered far more than knowledge; that being incorporated into the life of God mattered far more than understanding doctrinal formulae. Now, please don’t misunderstand, I am not saying that doctrine and teaching do not matter – far from it, we need to constantly delve deeper into this great mystery of love – but, what I am saying is that we must not forget that at the heart of the sacrament of the Lord’s Body and Blood is an act of belonging, of eating and drinking. St Thomas Aquinas, possibly one of the greatest theologians to explore the doctrine surrounding the Holy Eucharist, also understood that words were not the end of the matter. His Eucharistic hymns, well known by Catholics and Anglicans alike, and still used today, are expressively beautiful. “Faith our outward sense befriending, makes the inward vision clear.” Not knowledge, not being able to work your way through the Catechism but faith; faith is what connects the outward and visible sign of this sacrament to the inward and spiritual grace received; no longer bread but body; no longer wine but blood. We recognize Jesus in our midst but we also eat his body and drink his blood so that his presence is within us.
Here is a wonderful cyclical mystery: We gather as the body of Christ and consecrate the bread to become the body of Christ so that we can consume the Body of Christ and become the Body of Christ! This cycle does not end in Church for we are sent out into the world to be the Body of Christ in the world. I think it is hugely significant that the ancient word mass is rooted in the word mission; at the end of the liturgy we are dismissed – the dismissal links the Eucharistic offering to our mission in the world. And what is our mission statement at Saint Thomas Church Fifth Avenue? “To worship, love and serve Our Lord Jesus Christ through the Anglican tradition and our unique choral heritage.” That means that what we do in Church should affect our lives outside of church.
The Anglo Catholic Revival of the mid 19th and early 20th century in Anglicanism fought for the right to honor the real presence of Jesus in the Blessed Sacrament and in some of the ceremonial practices that were being reintroduced at the time. In the early part of the 20th century, there were huge gatherings at the Anglo-Catholic Congresses in London when hundreds of thousands of Anglican Christians gathered as a witness to their faith. One of the most famous sermons preached was by the, then, Bishop of Zanzibar Frank Weston, whose prophetic words still ring true today. In his sermon he linked faith with action; he linked adoration of the Blessed Sacrament with concern for the poor:
He said, “I say to you, and I say it to you with all the earnestness that I have, that if you are prepared to fight for the right of adoring Jesus in his Blessed Sacrament, then you have got to come out from before your Tabernacle and walk, with Christ mystically present in you, out into the streets of this country, and find the same Jesus in the people of your cities and your villages. You cannot claim to worship Jesus in the Tabernacle if you do not pity Jesus in the slum.”[1]
In this year of Lamentation in our diocese,[2] when we reflect on the involvement of the churches in slavery, I think we do well to ponder the poignancy of Bishop Frank Weston’s words. He knew only too well the link between faith and action because of his own diocese on the main island in the archipelago off the coast of Tanzania. Zanzibar Cathedral is built on the site of the former slave market site once an open space surrounded by small houses. In the middle of the houses was the whipping post where slaves could be punished or tested for how much pain they were able to endure to test for their ability to do hard labor. The high altar of the cathedral now stands on the site of the whipping post.
For me, that fact makes his words very powerful and his piety rooted in Gospel truth. In the 1920’s there were still ecclesiastic court cases over the reservation of the Sacrament in tabernacles on altar – like the one on our Chantry altar - and adoration of Jesus in the Blessed Sacrament in England. The tide was turning and we now take such things for granted. What we must not take for granted is the way that catholic expression is rooted in service to the poor.
After challenging his hearers about poverty, wages, and social conditions in England at the turn of the 20th century, Frank Weston reminded them that he was not talking economics or even politics, as he famously said, “I do not understand them.” What Frank Weston did understand was that that it was not possible to separate worshiping Jesus in the Blessed Sacrament and service to Jesus in the least of his brethren. I wonder what went through his mind as he celebrated mass at the High Altar of the Cathedral and contemplated that Christ’s earthly body was also tied to a post and whipped. As we approach the altar today and kneel to receive the Lord into our lives and hearts, will that holy communion affect the rest of our day and our week?
Some final words of Bishop Frank Weston from his sermon at the congress:
“There then, as I conceive it, is your present duty; and I beg you, brethren, as you love the Lord Jesus, consider that it is at least possible that this is the new light that the Congress was to bring to us. You have got your Mass, you have got your Altar, you have begun to get your Tabernacle. Now go out into the highways and hedges where not even the Bishops will try to hinder you. Go out and look for Jesus in the ragged, in the naked, in the oppressed and sweated, in those who have lost hope, in those who are struggling to make good. Look for Jesus. And when you see him, gird yourselves with his towel and try to wash their feet.”
_______________
[1] You can read the full text of the sermon on the unofficial website ‘Project Canterbury’ from a tract published after Frank Weston’s death in 1924 at http://anglicanhistory.org/weston/weston2.html
Please know that at noon, Monday through Saturday, a priest or lay minister says these prayers, and others, near the statue of Our Lady of Fifth Avenue, which is located at the rear of the nave on the south side of the church side. |
Q:
MVC3 doesn't recognize MvcContrib namespace in Razor View
I'm trying to paginate something with MvcContrib's Html.Pager(), but my razor views can't reference the right namespace.
Controller is ok:
using MvcContrib.Pagination;
...
public ActionResult List(int? page)
{
return View(new UserRepository().GetUserList().AsPagination(page ?? 1, 10));
}
But, the view can't make sense of either:
@using MvcContrib
OR
@Html.Pager((IPagination)Model)
I installed MvcContrib via NuGet. I tried adding MvcContrib, MvcContrib.UI and MvcContrib.UI.Html namespaces to <pages><namespaces> in web.config with no luck. Did I miss something?
A:
Contrary to WebForms, Razor doesn't use the <namespaces> section in ~/web.config. It uses the <namespaces> in ~/Views/web.config:
<system.web.webPages.razor>
<host factoryType="System.Web.Mvc.MvcWebRazorHostFactory, System.Web.Mvc, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" />
<pages pageBaseType="System.Web.Mvc.WebViewPage">
<namespaces>
<add namespace="System.Web.Mvc" />
<add namespace="System.Web.Mvc.Ajax" />
<add namespace="System.Web.Mvc.Html" />
<add namespace="System.Web.Routing" />
<add namespace="MvcContrib"/>
<add namespace="MvcContrib.UI.Grid"/>
<add namespace="MvcContrib.UI.Pager"/>
</namespaces>
</pages>
</system.web.webPages.razor>
and then:
@model MvcContrib.Pagination.IPagination<SomeViewModel>
@Html.Pager(Model)
or you could also add the proper namespace to your view if you prefer:
@model MvcContrib.Pagination.IPagination<SomeViewModel>
@using MvcContrib.UI.Pager
@Html.Pager(Model)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.